{"id":"https://openalex.org/W2049449085","doi":"https://doi.org/10.1109/mci.2013.2291689","title":"A Probabilistic Generative Model for Mining Cybercriminal Networks from Online Social Media","display_name":"A Probabilistic Generative Model for Mining Cybercriminal Networks from Online Social Media","publication_year":2014,"publication_date":"2014-01-24","ids":{"openalex":"https://openalex.org/W2049449085","doi":"https://doi.org/10.1109/mci.2013.2291689","mag":"2049449085"},"language":"en","primary_location":{"id":"doi:10.1109/mci.2013.2291689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mci.2013.2291689","pdf_url":null,"source":{"id":"https://openalex.org/S104797584","display_name":"IEEE Computational Intelligence Magazine","issn_l":"1556-603X","issn":["1556-603X","1556-6048"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computational Intelligence Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084348345","display_name":"Raymond Y.K. Lau","orcid":"https://orcid.org/0000-0002-5751-4550"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Raymond Y.K. Lau","raw_affiliation_strings":["Department of Information Systems, City University of Hong Kong, Hong Kong SAR","Department of Information Systems City University of Hong Kong Hong Kong China"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, City University of Hong Kong, Hong Kong SAR","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Information Systems City University of Hong Kong Hong Kong China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069555295","display_name":"Yunqing Xia","orcid":"https://orcid.org/0009-0005-8608-574X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunqing Xia","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China","Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002523892","display_name":"Yunming Ye","orcid":"https://orcid.org/0000-0002-1807-8581"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunming Ye","raw_affiliation_strings":["Shenzhen Key Lab of Internet Info Collaboration, Harbin Institute of Technology, Shenzhen, China","Shenzhen Key Lab. of Internet Inf. Collaboration, Harbin Inst. of Technol., Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Lab of Internet Info Collaboration, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I158809036"]},{"raw_affiliation_string":"Shenzhen Key Lab. of Internet Inf. Collaboration, Harbin Inst. of Technol., Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084348345"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":36.2893,"has_fulltext":false,"cited_by_count":88,"citation_normalized_percentile":{"value":0.9970189,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"9","issue":"1","first_page":"31","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8134372234344482},{"id":"https://openalex.org/keywords/latent-dirichlet-allocation","display_name":"Latent Dirichlet allocation","score":0.7775986194610596},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7547000050544739},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.60691899061203},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6045024394989014},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5746455788612366},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5345131158828735},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.5318023562431335},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5206522345542908},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.5171217918395996},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.500532865524292},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4960831105709076},{"id":"https://openalex.org/keywords/gibbs-sampling","display_name":"Gibbs sampling","score":0.43713587522506714},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39973774552345276},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3269667625427246},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.2756892442703247},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1810828149318695},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17914792895317078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8134372234344482},{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.7775986194610596},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7547000050544739},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.60691899061203},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6045024394989014},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5746455788612366},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5345131158828735},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.5318023562431335},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5206522345542908},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.5171217918395996},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.500532865524292},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4960831105709076},{"id":"https://openalex.org/C158424031","wikidata":"https://www.wikidata.org/wiki/Q1191905","display_name":"Gibbs sampling","level":3,"score":0.43713587522506714},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39973774552345276},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3269667625427246},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.2756892442703247},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1810828149318695},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17914792895317078},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mci.2013.2291689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mci.2013.2291689","pdf_url":null,"source":{"id":"https://openalex.org/S104797584","display_name":"IEEE Computational Intelligence Magazine","issn_l":"1556-603X","issn":["1556-603X","1556-6048"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computational Intelligence Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.550000011920929},{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307117","display_name":"HSBC Bank USA","ror":"https://ror.org/00t2kp174"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W180474045","https://openalex.org/W1552949272","https://openalex.org/W1628238922","https://openalex.org/W1880262756","https://openalex.org/W1912982817","https://openalex.org/W1963912989","https://openalex.org/W1971302895","https://openalex.org/W1972474368","https://openalex.org/W2005806336","https://openalex.org/W2008255964","https://openalex.org/W2012885235","https://openalex.org/W2020999234","https://openalex.org/W2028740820","https://openalex.org/W2038721957","https://openalex.org/W2044173330","https://openalex.org/W2047604680","https://openalex.org/W2055103902","https://openalex.org/W2069078812","https://openalex.org/W2069236340","https://openalex.org/W2070019648","https://openalex.org/W2074185365","https://openalex.org/W2084259014","https://openalex.org/W2098162425","https://openalex.org/W2105751419","https://openalex.org/W2109154616","https://openalex.org/W2132280055","https://openalex.org/W2139669429","https://openalex.org/W2146874204","https://openalex.org/W2149167588","https://openalex.org/W2153080265","https://openalex.org/W2156693754","https://openalex.org/W2158389539","https://openalex.org/W3023540311","https://openalex.org/W4206765718","https://openalex.org/W4231510805","https://openalex.org/W4239223658","https://openalex.org/W4240913316","https://openalex.org/W4242142280","https://openalex.org/W6607413097","https://openalex.org/W6639619044","https://openalex.org/W6679886283","https://openalex.org/W7028060376"],"related_works":["https://openalex.org/W2769501189","https://openalex.org/W4315588616","https://openalex.org/W4312773271","https://openalex.org/W2888805565","https://openalex.org/W2962686197","https://openalex.org/W3005513013","https://openalex.org/W2207653751","https://openalex.org/W3159709618","https://openalex.org/W2611137333","https://openalex.org/W2352674739"],"abstract_inverted_index":{"Abstract-There":[0],"has":[1],"been":[2],"a":[3,83,103,109,189],"rapid":[4],"growth":[5],"in":[6,37,151],"the":[7,33,67,80,97,127,132,140,156,167,176,183],"number":[8,70],"of":[9,71,76,82,153,178,187],"cybercr":[10],"imes":[11],"that":[12,22,126],"cause":[13],"tremendous":[14],"financial":[15],"loss":[16],"to":[17,25,48,55,65,91,193],"organizations.":[18],"Recent":[19],"studies":[20],"reveal":[21,125],"cybercriminals":[23],"tend":[24],"collaborate":[26],"or":[27],"even":[28],"transact":[29],"cyber-attack":[30],"tools":[31],"via":[32],"\"dark":[34],"markets\"":[35],"established":[36],"online":[38,198],"social":[39,119,199],"media.":[40,200],"Accordingly,":[41],"it":[42],"presents":[43],"unprecedented":[44],"opportunities":[45],"for":[46],"researchers":[47],"tap":[49],"into":[50],"these":[51],"underground":[52],"cybercriminal":[53,87,195],"communities":[54],"develop":[56],"better":[57],"insights":[58],"about":[59],"collaborative":[60],"cybercrime":[61,93],"activities":[62],"so":[63],"as":[64,166],"combat":[66],"ever":[68],"increasing":[69],"cybercrimes.":[72],"The":[73],"main":[74],"contribution":[75],"this":[77,181],"paper":[78],"is":[79,100,182],"development":[81],"novel":[84,110],"weakly":[85],"supervised":[86],"network":[88],"mining":[89],"method":[90,99,129,138,146],"facilitate":[92],"forensics.":[94],"In":[95],"particular,":[96],"proposed":[98,128],"underpinned":[101],"by":[102,108,147],"probabilistic":[104,190],"generative":[105,191],"model":[106,192],"enhanced":[107],"context-sensitive":[111],"Gibbs":[112],"sampling":[113],"algorithm.":[114],"Evaluated":[115],"based":[116,137,145],"on":[117],"two":[118],"media":[120],"corpora,":[121],"our":[122,179],"experimental":[123],"results":[124],"significantly":[130],"outperforms":[131],"Latent":[133],"Dirichlet":[134,171],"Allocation":[135,172],"(LDA)":[136],"and":[139,149],"Support":[141],"Vector":[142],"Machine":[143],"(SVM)":[144],"5.23%":[148],"16.62%":[150],"terms":[152],"Area":[154],"Under":[155],"ROC":[157],"Curve":[158],"(AUC),":[159],"respectively.":[160],"It":[161],"also":[162],"achieves":[163],"comparable":[164],"performance":[165],"state-of-the-art":[168],"Partially":[169],"Labeled":[170],"(PLDA)":[173],"method.":[174],"To":[175],"best":[177],"knowledge,":[180],"first":[184],"successful":[185],"research":[186],"applying":[188],"mine":[194],"networks":[196],"from":[197]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":22}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
