{"id":"https://openalex.org/W3217791241","doi":"https://doi.org/10.1109/isi53945.2021.9624848","title":"Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics","display_name":"Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics","publication_year":2021,"publication_date":"2021-11-02","ids":{"openalex":"https://openalex.org/W3217791241","doi":"https://doi.org/10.1109/isi53945.2021.9624848","mag":"3217791241"},"language":"en","primary_location":{"id":"doi:10.1109/isi53945.2021.9624848","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi53945.2021.9624848","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075447553","display_name":"Benjamin Ampel","orcid":"https://orcid.org/0000-0003-0603-0270"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Benjamin Ampel","raw_affiliation_strings":["University of Arizona, Tucson, AZ, United States"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ, United States","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109924510","display_name":"Hsinchun Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hsinchun Chen","raw_affiliation_strings":["University of Arizona, Tucson, AZ, United States"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ, United States","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075447553"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":1.377,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85810193,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8860424757003784},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7806891202926636},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6912503242492676},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.6743087768554688},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6649819612503052},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5585235953330994},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.5494201183319092},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.5400797128677368},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47916117310523987},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4725603461265564},{"id":"https://openalex.org/keywords/f1-score","display_name":"F1 score","score":0.4689065217971802},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.46114474534988403},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4382350444793701},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.41808727383613586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37631845474243164},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32724928855895996},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11008712649345398}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8860424757003784},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7806891202926636},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6912503242492676},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.6743087768554688},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6649819612503052},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5585235953330994},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.5494201183319092},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.5400797128677368},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47916117310523987},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4725603461265564},{"id":"https://openalex.org/C148524875","wikidata":"https://www.wikidata.org/wiki/Q6975395","display_name":"F1 score","level":2,"score":0.4689065217971802},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.46114474534988403},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4382350444793701},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.41808727383613586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37631845474243164},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32724928855895996},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11008712649345398},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi53945.2021.9624848","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi53945.2021.9624848","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1672113969","https://openalex.org/W2250539671","https://openalex.org/W2252211741","https://openalex.org/W2896457183","https://openalex.org/W2914403931","https://openalex.org/W2917807496","https://openalex.org/W2963626623","https://openalex.org/W2988533489","https://openalex.org/W3035102548","https://openalex.org/W3086302916","https://openalex.org/W3113358185","https://openalex.org/W3173511996","https://openalex.org/W4250531815","https://openalex.org/W4294170691","https://openalex.org/W6682691769","https://openalex.org/W6755207826","https://openalex.org/W6759316929","https://openalex.org/W6795988940"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W4286233423","https://openalex.org/W2797817943","https://openalex.org/W4366770808","https://openalex.org/W4401129478","https://openalex.org/W3081652108","https://openalex.org/W4205149331","https://openalex.org/W4312858192"],"abstract_inverted_index":{"Hacker":[0],"forums":[1,22],"provide":[2,24,41],"malicious":[3],"actors":[4],"with":[5],"a":[6,42,71,77,106],"large":[7],"database":[8],"of":[9,20,87],"tutorials,":[10],"goods,":[11],"and":[12,34,103],"assets":[13],"to":[14,27,40,48,70,75],"leverage":[15],"for":[16,105],"cyber-attacks.":[17],"Careful":[18],"research":[19],"these":[21],"can":[23],"tremendous":[25],"benefit":[26],"the":[28,64],"cybersecurity":[29],"community":[30],"through":[31],"trend":[32],"identification":[33],"exploit":[35],"categorization.":[36],"This":[37],"study":[38],"aims":[39],"novel":[43],"static":[44,82],"word":[45,83],"embedding,":[46],"Hack2Vec,":[47],"improve":[49],"performance":[50,95],"on":[51],"hacker":[52,80,108],"forum":[53,81,109],"classification":[54,110],"tasks.":[55],"Our":[56],"proposed":[57],"Hack2Vec":[58,93],"model":[59,68,74],"distills":[60],"contextual":[61],"representations":[62],"from":[63],"seminal":[65],"pre-trained":[66],"language":[67],"BERT":[69],"continuous":[72],"bag-of-words":[73],"create":[76],"highly":[78],"targeted":[79],"embedding.":[84],"The":[85],"results":[86],"our":[88],"experimental":[89],"design":[90],"indicate":[91],"that":[92],"improves":[94],"over":[96],"prominent":[97],"embeddings":[98],"in":[99],"accuracy,":[100],"precision,":[101],"recall,":[102],"F1-score":[104],"benchmark":[107],"task.":[111]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
