{"id":"https://openalex.org/W2011313205","doi":"https://doi.org/10.1109/comsnets.2015.7098738","title":"Using common-sense knowledge-base for detecting word obfuscation in adversarial communication","display_name":"Using common-sense knowledge-base for detecting word obfuscation in adversarial communication","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2011313205","doi":"https://doi.org/10.1109/comsnets.2015.7098738","mag":"2011313205"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2015.7098738","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2015.7098738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101638988","display_name":"Swati Agarwal","orcid":"https://orcid.org/0000-0001-9586-2794"},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Swati Agarwal","raw_affiliation_strings":["IIIT-D, Indraprasth Institute of Information and Technology, Delhi, India","Indraprasth Institute of Information and Technology, Delhi (IIIT-D), India"],"affiliations":[{"raw_affiliation_string":"IIIT-D, Indraprasth Institute of Information and Technology, Delhi, India","institution_ids":["https://openalex.org/I119939252"]},{"raw_affiliation_string":"Indraprasth Institute of Information and Technology, Delhi (IIIT-D), India","institution_ids":["https://openalex.org/I119939252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029699582","display_name":"Ashish Sureka","orcid":"https://orcid.org/0000-0001-6084-9661"},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashish Sureka","raw_affiliation_strings":["IIIT-D, Indraprasth Institute of Information and Technology, Delhi, India","Indraprasth Institute of Information and Technology, Delhi (IIIT-D), India"],"affiliations":[{"raw_affiliation_string":"IIIT-D, Indraprasth Institute of Information and Technology, Delhi, India","institution_ids":["https://openalex.org/I119939252"]},{"raw_affiliation_string":"Indraprasth Institute of Information and Technology, Delhi (IIIT-D), India","institution_ids":["https://openalex.org/I119939252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101638988"],"corresponding_institution_ids":["https://openalex.org/I119939252"],"apc_list":null,"apc_paid":null,"fwci":2.8229,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.90010432,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8153371810913086},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7648123502731323},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6957263946533203},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.6050745844841003},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.5371482968330383},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.45160943269729614},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.430825412273407},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4222542941570282},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20501163601875305},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10886457562446594}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8153371810913086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7648123502731323},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6957263946533203},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.6050745844841003},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.5371482968330383},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.45160943269729614},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.430825412273407},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4222542941570282},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20501163601875305},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10886457562446594},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2015.7098738","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2015.7098738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W13682356","https://openalex.org/W104315014","https://openalex.org/W1930331324","https://openalex.org/W2016089260","https://openalex.org/W2016656508","https://openalex.org/W2058339786","https://openalex.org/W2117287993","https://openalex.org/W2157082519","https://openalex.org/W2740174993","https://openalex.org/W6741900884"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W2502115930","https://openalex.org/W67940504","https://openalex.org/W2066014542","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W2385713529","https://openalex.org/W2599749361"],"abstract_inverted_index":{"Word":[0,21],"obfuscation":[1,22],"or":[2,19,30,45],"substitution":[3,102,195,214],"means":[4],"replacing":[5],"one":[6],"word":[7,10,101,126,194,213],"with":[8],"another":[9],"in":[11,25,92,103,217],"a":[12,56,63,83,112,143,182,187,203,207],"sentence":[13],"to":[14,131,150,156,201,220],"conceal":[15],"the":[16,96,108,133,218,228],"textual":[17,113],"content":[18],"communication.":[20,105],"is":[23,55,231],"used":[24,197,216],"adversarial":[26,104],"communication":[27],"by":[28,39,171,198],"terrorist":[29],"criminals":[31],"for":[32,94,124],"conveying":[33],"their":[34],"messages":[35,47],"without":[36],"getting":[37],"red-flagged":[38],"security":[40],"and":[41,51,71,115,119,141,177],"intelligence":[42],"agencies":[43],"intercepting":[44],"scanning":[46],"(such":[48],"as":[49,62,69,73,111],"emails":[50,169],"telephone":[52],"conversations).":[53],"ConceptNet":[54,93,130],"freely":[57],"available":[58],"semantic":[59,90],"network":[60],"represented":[61],"directed":[64],"graph":[65],"consisting":[66,211],"of":[67,75,89,100,162,174,190,209,212],"nodes":[68],"concepts":[70],"edges":[72],"assertions":[74],"common":[76],"sense":[77],"about":[78,181],"these":[79],"concepts.":[80],"We":[81,106,128,192],"present":[82],"solution":[84],"approach":[85,160,230],"exploiting":[86],"vast":[87],"amount":[88],"knowledge":[91],"addressing":[95],"technically":[97],"challenging":[98],"problem":[99,110],"frame":[107],"given":[109,139],"reasoning":[114],"context":[116],"inference":[117],"task":[118],"utilize":[120],"ConceptNet's":[121],"natural-language-processing":[122],"tool-kit":[123],"determining":[125],"substitution.":[127],"use":[129],"compute":[132],"conceptual":[134],"similarity":[135],"between":[136],"any":[137],"two":[138],"terms":[140],"define":[142],"Mean":[144],"Average":[145],"Conceptual":[146],"Similarity":[147],"(MACS)":[148],"metric":[149],"identify":[151],"out-of-context":[152],"terms.":[153],"The":[154],"test-bed":[155],"evaluate":[157,221],"our":[158,222],"proposed":[159,229],"consists":[161],"Enron":[163,175],"email":[164],"dataset":[165],"(having":[166],"over":[167],"600000":[168],"generated":[170],"158":[172],"employees":[173],"Corporation)":[176],"Brown":[178],"corpus":[179],"(totaling":[180],"million":[183],"words":[184],"drawn":[185],"from":[186],"wide":[188],"variety":[189],"sources).":[191],"implement":[193],"techniques":[196],"previous":[199],"researches":[200],"generate":[202],"test":[204],"dataset.We":[205],"conduct":[206],"series":[208],"experiments":[210],"methods":[215],"past":[219],"approach.":[223],"Experimental":[224],"results":[225],"reveal":[226],"that":[227],"effective.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
