{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:35:40Z","timestamp":1776530140056,"version":"3.51.2"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,11]],"date-time":"2017-05-11T00:00:00Z","timestamp":1494460800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Find Me Group"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13388-017-0029-8","type":"journal-article","created":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T13:53:55Z","timestamp":1497275635000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Semi-supervised learning for detecting human trafficking"],"prefix":"10.1186","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7172-0134","authenticated-orcid":false,"given":"Hamidreza","family":"Alvari","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Shakarian","sequence":"additional","affiliation":[]},{"given":"J. E. Kelly","family":"Snyder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,11]]},"reference":[{"key":"29_CR1","unstructured":"(2011) UNODC on human tracking and migrant smuggling. https:\/\/www.unodc.org\/unodc\/en\/human-tracking\/ . Accessed 20 Dec 2016"},{"key":"29_CR2","unstructured":"(2000) Trafficking victims protection act of 2000. https:\/\/www.state.gov\/j\/tip\/laws\/61124.htm . Accessed 20 Dec 2016"},{"key":"29_CR3","unstructured":"(2015) Trafficking in persons report. https:\/\/www.state.gov\/j\/tip\/rls\/tiprpt\/2015\/ . Accessed 20 Dec 2016"},{"key":"29_CR4","unstructured":"Desplaces C (1992) Police run \u2018Prostitution\u2019 sting; 19 men arrested, charged in Fourth East Dallas operation. Dallas Morning News"},{"key":"29_CR5","unstructured":"Kristof ND (2012) How pimps use the web to sell girls. New York Times. http:\/\/www.nytimes.com\/2012\/01\/26\/opinion\/how-pimps-use-the-web-to-sell-girls.html . Accessed 20 Dec 2016"},{"key":"29_CR6","unstructured":"Kennedy E (2012) Predictive patterns of sex trafficking online. Dietrich College Honors Theses, B.S. thesis, Carnegie Mellon University"},{"key":"29_CR7","first-page":"701","volume":"10","author":"TM Mitchell","year":"2006","unstructured":"Mitchell TM (2006) Learning from labeled and unlabeled data. Mach Learn 10:701","journal-title":"Mach Learn"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Beigi G, Tang J, Liu H (2016) Signed link analysis in social media networks. In: 10th international conference on web and social media, ICWSM 2016, AAAI Press, Cologne, Germany","DOI":"10.1609\/icwsm.v10i1.14793"},{"key":"29_CR9","doi-asserted-by":"publisher","unstructured":"Backstrom L, Leskovec J (2011) Supervised random walks: predicting and recommending links in social networks. In: Proceedings of the fourth ACM international conference on Web search and data mining. WSDM \u201911, Hong Kong, China. ACM, New York, pp 635\u2013644. doi: 10.1145\/1935826.1935914","DOI":"10.1145\/1935826.1935914"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13278-016-0390-5","volume":"6","author":"H Alvari","year":"2016","unstructured":"Alvari H, Hajibagheri A, Sukthankar G, Lakkaraju K (2016) Identifying community structures in dynamic networks. Soc Netw Anal Min SNAM 6(1):77. doi: 10.1007\/s13278-016-0390-5","journal-title":"Soc Netw Anal Min SNAM"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Beigi G, Tang J, Wang S, Liu H (2016) Exploiting emotional information for trust\/distrust prediction. In: Proceedings of the 2016 SIAM international conference on data mining (ICDM), SIAM, Miami, FL, USA","DOI":"10.1137\/1.9781611974348.10"},{"key":"29_CR12","unstructured":"Mitchell et\u00a0al TM (1997) Machine learning, I\u2013XVII. McGraw-Hill Education. https:\/\/www.bibsonomy.org\/bibtex\/2e1eee0d0daaef20092093d6643b53c4f\/machinelearning . Accessed 20 Dec 2016"},{"key":"29_CR13","unstructured":"Beigi G, Jalili M, Alvari H, Sukthankar G (2014) Leveraging community detection for accurate trust prediction. In: ASE international conference on social computing, Palo Alto, CA"},{"issue":"Nov","key":"29_CR14","first-page":"2399","volume":"7","author":"M Belkin","year":"2006","unstructured":"Belkin M, Niyogi P, Sindhwani V (2006) Manifold regularization: a geometric framework for learning from labeled and unlabeled examples. J Mach Learn Res 7(Nov):2399\u20132434","journal-title":"J Mach Learn Res"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Alvari H, Shakarian P, Snyder J (2016) A non-parametric learning approach to identify online human trafficking. In: IEEE intelligence and security informatics (ISI) conference, pp. 133\u2013138","DOI":"10.1109\/ISI.2016.7745456"},{"key":"29_CR16","unstructured":"Hughes DM et al (2005) The demand for victims of sex trafficking. Womens Studies Program, University of Rhode Island, RI"},{"issue":"1","key":"29_CR17","first-page":"129","volume":"13","author":"DM Hughes","year":"2002","unstructured":"Hughes DM (2002) The use of new communications and information technologies for sexual exploitation of women and children. Hastings Women\u2019s Law J 13(1):129\u2013148","journal-title":"Hastings Women\u2019s Law J"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Latonero M (2011) Human trafficking online: the role of social networking sites and online classifieds. Available at SSRN 2045851","DOI":"10.2139\/ssrn.2045851"},{"key":"29_CR19","unstructured":"Roe-Sepowitz D, Gallagher J, Bracy K, Cantelme L, Bayless A, Larkin J, Reese A, Allbee L (2015) Exploring the impact of the super bowl on sex trafficking. https:\/\/www.mccaininstitute.org\/exploring-the-impact-of-the-super-bowl-on-sex-tracking-2015\/ . Accessed 20 Dec 2016"},{"key":"29_CR20","unstructured":"Miller K, Kennedy E, Dubrawski A (2016) Do public events affect sex trafficking activity? https:\/\/arxiv.org\/abs\/1602.05048 . Accessed 20 Dec 2016"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Szekely PA, Knoblock CA, Slepicka J, Philpot A, Singh A, Yin C, Kapoor D, Natarajan P, Marcu D, Knight K, Stallard D, Karunamoorthy SS, Bojanapalli R, Minton S, Amanatullah B, Hughes T, Tamayo M, Flynt D, Artiss R, Chang S-F, Chen T, Hiebel G, Ferreira L (2015) Building and using a knowledge graph to combat human trafficking. In: International semantic web conference (2), ser. Lecture notes in computer science, vol 9367. Springer, Switzerland, pp 205\u2013221","DOI":"10.1007\/978-3-319-25010-6_12"},{"key":"29_CR22","unstructured":"Nagpal C, Miller K, Boecking B, Dubrawski A (2015) An entity resolution approach to isolate instances of human trafficking online. https:\/\/arxiv.org\/abs\/1509.06659 . Accessed 20 Dec 2016"},{"issue":"1","key":"29_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/23322705.2015.1015342","volume":"1","author":"A Dubrawski","year":"2015","unstructured":"Dubrawski A, Miller K, Barnes M, Boecking B, Kennedy E (2015) Leveraging publicly available data to discern patterns of human-trafficking activity. J Hum Traffick 1(1):65\u201385. doi: 10.1080\/23322705.2015.1015342","journal-title":"J Hum Traffick"},{"key":"29_CR24","unstructured":"Zhou D, Bousquet O, Lal TN, Weston J, Schlkopf B (2004) Learning with local and global consistency. In: Advances in neural information processing systems 16. MIT Press, Cambridge, MA, pp. 321\u2013328"},{"key":"29_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-49820-1","volume-title":"An introduction to kolmogorov complexity and its applications","author":"M Li","year":"2008","unstructured":"Li M, Vitnyi PM (2008) An introduction to kolmogorov complexity and its applications, 3rd edn. Springer, New York","edition":"3"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Kanaris I, Kanaris K, Stamatatos E (2006) Spam detection using character n-grams. In: Antoniou G, Potamias G, Spyropoulos C, Plexousakis D (eds), Advances in Artificial Intelligence. SETN 2006. Lecture Notes in Computer Science, vol 3955. Springer, Berlin, pp 95\u2013104","DOI":"10.1007\/11752912_12"},{"key":"29_CR27","unstructured":"Hetter K (2012) Fighting sex trafficking in hotels, one room at a time. Cable News Network. http:\/\/www.cnn.com\/2012\/02\/29\/travel\/hotel-sex-tracking\/ . Accessed 20 Dec 2016"},{"key":"29_CR28","unstructured":"Lloyd R (2012) An open letter to jim Buckmaster. Change.org Inc. http:\/\/www.hungtonpost.com\/rachel-lloyd\/an-open-letter-to-jim-buc_b_570666.html . Accessed 20 Dec 2016"},{"key":"29_CR29","unstructured":"Dickinson Goodman J, Holmes M (2011) Can we use RSS to catch rapists. Grace Hopper Celebration of Women in Computing, Portland, OR. http:\/\/jessicadickinsongoodman.com\/2011\/10\/30\/can-we-use-rss-to-catch-rapists-poster-nished\/ . Accessed 20 Dec 2016"},{"key":"29_CR30","unstructured":"Average height to weight chart\u2014babies to teenagers. http:\/\/www.disabled-world.com\/artman\/publish\/height-weight-teens.shtml . Accessed 20 Dec 2016"},{"issue":"1","key":"29_CR31","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon CE (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5(1):3\u201355","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"29_CR32","unstructured":"van\u00a0der Maaten L, Hinton G (2008) Visualizing high-dimensional data using t-SNE. Journal of Machine Learning Research 9:2579\u20132605"},{"issue":"3","key":"29_CR33","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"29_CR34","unstructured":"Belkin M, Niyogi P, Sindhwani V (2004) On manifold regularization. Technical report tr-2004-05. The University of Chicago"},{"key":"29_CR35","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1090\/conm\/398\/07486","volume":"398","author":"A Grigoryan","year":"2006","unstructured":"Grigoryan A (2006) Heat kernels on weighted manifolds and applications. Contempl Math 398:93\u2013191","journal-title":"Contempl Math"},{"key":"29_CR36","doi-asserted-by":"crossref","unstructured":"Blum A, Mitchell T (1998) Combining labeled and unlabeled data with co-training. In: Proceedings of the eleventh annual conference on Computational learning theory. ACM, pp 92\u2013100","DOI":"10.1145\/279943.279962"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-017-0029-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-017-0029-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-017-0029-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T00:38:53Z","timestamp":1692837533000},"score":1,"resource":{"primary":{"URL":"http:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-017-0029-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,11]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["29"],"URL":"https:\/\/doi.org\/10.1186\/s13388-017-0029-8","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,11]]},"article-number":"1"}}