The World Wide Web Conference 2019
DOI: 10.1145/3308558.3313537
|View full text |Cite
|
Sign up to set email alerts
|

Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 39 publications
(40 citation statements)
references
References 25 publications
0
40
0
Order By: Relevance
“…And then align users based on those embedding vectors. uStyle-uID [45] utilizes user writing and photo style to predict the label of identity pairs in Darknet network, while iDev [4] predict the label of identity pairs based on the feature coding published by user in public social coding platforms. DALAUP [3] utilizes active learning to solve the problem that labeled data is difficult to obtain in the UIL task.…”
Section: User Identities Linkagementioning
confidence: 99%
“…And then align users based on those embedding vectors. uStyle-uID [45] utilizes user writing and photo style to predict the label of identity pairs in Darknet network, while iDev [4] predict the label of identity pairs based on the feature coding published by user in public social coding platforms. DALAUP [3] utilizes active learning to solve the problem that labeled data is difficult to obtain in the UIL task.…”
Section: User Identities Linkagementioning
confidence: 99%
“…For traditional machine learning-based methods, using the augment features (i.e.,f-7) as the inputs, we consider typical classification models of Decision Tree (DT) and Support Vector Machine (SVM) and compare them with the DNN classifier described in Section 2.4. We also compare our system dStyle-GAN with the existing system uStyle-uID [51]. In uStyle-uID, we redefine the entities and relations for AHIN and rebuilt meta-paths in uStyle-uID to learn node embeddings for drug identification.…”
Section: Comparisons With Competing Approachesmentioning
confidence: 99%
“…To combat illicit drug trafficking in darknet makrets, there have been many research efforts on darknet market data analysis: for examples, [6,11,15,28,42,47,51] focus on drug trafficker identification and trafficking network investigation; while [7-10, 12, 14, 16, 44] explore statistical methodologies to analyze illicit drugs traded in the markets. Since the identification and analysis of illicit drugs can not only provide valuable insights to profile drug traffickers but also enable the deep understanding of dynamics and evolution of drug trafficking activities, in this work, we focus on the illicit drug identification and investigation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…HIN has been intensively deployed to various applications, such as authorship identification [40], malware detection [18], [12], [38], and health intelligence [14], [13]. To reduce the high computation and space cost in network mining, many efficient network embedding methods have been proposed, including homogeneous network representation learning (e.g., DeepWalk [26], node2vec [17], LINE [32], and TADW [36]) and HIN representation learning (e.g., ESim [28], metap-ath2vec [11] and HIN2vec [37]).…”
Section: Related Workmentioning
confidence: 99%