{"id":"https://openalex.org/W4381744140","doi":"https://doi.org/10.1109/cscwd57460.2023.10152775","title":"Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN","display_name":"Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN","publication_year":2023,"publication_date":"2023-05-24","ids":{"openalex":"https://openalex.org/W4381744140","doi":"https://doi.org/10.1109/cscwd57460.2023.10152775"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd57460.2023.10152775","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd57460.2023.10152775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101441094","display_name":"Xiaoqing Ma","orcid":"https://orcid.org/0000-0001-8783-2448"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoqing Ma","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","National Engineering Laboratory for Information Security Technologies, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Engineering Laboratory for Information Security Technologies, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011296789","display_name":"Chao Zheng","orcid":"https://orcid.org/0000-0003-2943-3953"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chao Zheng","raw_affiliation_strings":["Geedge Networks,Beijing,China","Geedge Networks, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Geedge Networks,Beijing,China","institution_ids":[]},{"raw_affiliation_string":"Geedge Networks, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006025566","display_name":"Li Zhao","orcid":"https://orcid.org/0000-0001-7374-3348"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhao Li","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","National Engineering Laboratory for Information Security Technologies, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"National Engineering Laboratory for Information Security Technologies, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046636707","display_name":"Jiangyi Yin","orcid":"https://orcid.org/0000-0002-9037-4676"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangyi Yin","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","National Engineering Laboratory for Information Security Technologies, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory for Information Security Technologies, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100713362","display_name":"Qingyun Liu","orcid":"https://orcid.org/0000-0003-4815-3463"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyun Liu","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","National Engineering Laboratory for Information Security Technologies, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory for Information Security Technologies, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062771971","display_name":"Xunxun Chen","orcid":"https://orcid.org/0000-0002-9481-4819"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xunxun Chen","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing,China","National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing,China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101441094"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210160629","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65713375,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1741","last_page":"1747"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765110731124878},{"id":"https://openalex.org/keywords/hyperlink","display_name":"Hyperlink","score":0.637607216835022},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4853021502494812},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4702310264110565},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4493459165096283},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.44431188702583313},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.43497854471206665},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.35903751850128174},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.12501224875450134},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.11868739128112793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765110731124878},{"id":"https://openalex.org/C30088001","wikidata":"https://www.wikidata.org/wiki/Q102014","display_name":"Hyperlink","level":3,"score":0.637607216835022},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4853021502494812},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4702310264110565},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4493459165096283},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.44431188702583313},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.43497854471206665},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35903751850128174},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.12501224875450134},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.11868739128112793},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd57460.2023.10152775","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd57460.2023.10152775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2384033143","https://openalex.org/W1525584714","https://openalex.org/W2366569016","https://openalex.org/W2169968158","https://openalex.org/W1999760390","https://openalex.org/W2086877241","https://openalex.org/W2521046503","https://openalex.org/W1989883077","https://openalex.org/W2086028161","https://openalex.org/W1974853862"],"abstract_inverted_index":{"The":[0,133],"rapid":[1],"development":[2],"of":[3,13,32,114,130],"pornographic":[4,48,93],"and":[5,29,34,49,54,63,94,101,118,145,166],"gambling":[6,50,95],"websites,":[7],"fueled":[8],"by":[9,97],"the":[10,27,128,141,159,162],"widespread":[11],"abuse":[12],"information":[14,76],"technology,":[15],"has":[16],"become":[17,52],"a":[18,23],"growing":[19],"concern.":[20],"They":[21],"pose":[22],"serious":[24],"threat":[25],"to":[26,44,60,73,91,158],"physical":[28],"mental":[30],"health":[31],"children":[33],"can":[35,123],"also":[36,150],"endanger":[37],"personal":[38],"property.":[39],"Therefore,":[40,69],"it":[41,70],"is":[42,71],"necessary":[43],"detect":[45,92],"them.":[46],"However,":[47],"websites":[51,96],"more":[53,55],"tricky,":[56],"which":[57],"shows":[58],"fake-normal":[59],"evade":[61],"censorship":[62],"challenges":[64],"traditional":[65],"content-based":[66],"detection":[67],"methods.":[68],"essential":[72],"rely":[74],"on":[75],"about":[77],"relationships":[78],"between":[79],"websites.We":[80],"propose":[81],"HMAN,":[82],"one":[83,110],"Multi-Attention":[84],"Heterogeneous":[85],"Graph":[86],"Neural":[87],"Network":[88],"(HGNN)":[89],"model":[90],"integrating":[98],"content":[99,121],"features":[100,122],"structural":[102,131],"information,":[103],"even":[104],"if":[105],"they":[106],"present":[107],"fake-normal.":[108],"By":[109],"multi-attention":[111],"mechanism":[112],"consisting":[113],"explicit":[115],"weight,":[116],"self-attention":[117],"attention":[119],"mechanism,":[120],"be":[124],"selectively":[125],"utilized":[126],"with":[127],"assistance":[129],"information.":[132],"experimental":[134],"results":[135],"show":[136],"that":[137,152],"our":[138],"method":[139],"achieves":[140],"best":[142],"95.1%":[143],"Macro-Avg-F1":[144],"outperforms":[146],"all":[147,153],"baselines.":[148],"We":[149],"illustrate":[151],"extracted":[154],"metapaths":[155],"do":[156],"contribute":[157],"detection,":[160],"where":[161],"hyperlink,":[163],"title/meta":[164],"terms":[165],"IP":[167],"address":[168],"are":[169],"relatively":[170],"important.":[171]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
