{"id":"https://openalex.org/W2597463894","doi":"https://doi.org/10.1145/3041008.3041013","title":"MCDefender","display_name":"MCDefender","publication_year":2017,"publication_date":"2017-03-24","ids":{"openalex":"https://openalex.org/W2597463894","doi":"https://doi.org/10.1145/3041008.3041013","mag":"2597463894"},"language":"en","primary_location":{"id":"doi:10.1145/3041008.3041013","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3041008.3041013","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3041013&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=3041013&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083805756","display_name":"Nishant Vishwamitra","orcid":"https://orcid.org/0000-0002-3728-1921"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nishant Vishwamitra","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368929","display_name":"Xiang Zhang","orcid":"https://orcid.org/0009-0001-9312-1762"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiang Zhang","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110944741","display_name":"Jonathan Tong","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jonathan Tong","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056657952","display_name":"Hongxin Hu","orcid":"https://orcid.org/0000-0001-8710-247X"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongxin Hu","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100683466","display_name":"Feng Luo","orcid":"https://orcid.org/0000-0002-4813-2403"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Feng Luo","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103056699","display_name":"Robin M. Kowalski","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robin Kowalski","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071462370","display_name":"Joseph P. Mazer","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph Mazer","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5083805756"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":0.9328,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.74426207,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7923595905303955},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6833491325378418},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.6724913120269775},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5908732414245605},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.543269157409668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5202164053916931},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.46120685338974},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41774624586105347},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.41522833704948425},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3204621374607086},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2991567850112915},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22156789898872375},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06372895836830139}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7923595905303955},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6833491325378418},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.6724913120269775},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5908732414245605},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.543269157409668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5202164053916931},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.46120685338974},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41774624586105347},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.41522833704948425},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3204621374607086},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2991567850112915},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22156789898872375},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06372895836830139},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3041008.3041013","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3041008.3041013","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3041013&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3041008.3041013","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3041008.3041013","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3041013&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4089661208","display_name":null,"funder_award_id":"1527421","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4275521167","display_name":null,"funder_award_id":"1537924, 1527421","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7265552","display_name":null,"funder_award_id":"1537924","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7664692978","display_name":null,"funder_award_id":"NSF-IIS-1527421","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8961866524","display_name":null,"funder_award_id":"IIS-1527421","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2597463894.pdf","grobid_xml":"https://content.openalex.org/works/W2597463894.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W6908809","https://openalex.org/W927971848","https://openalex.org/W1555931331","https://openalex.org/W1832693441","https://openalex.org/W1934426326","https://openalex.org/W2034757259","https://openalex.org/W2044173330","https://openalex.org/W2086104130","https://openalex.org/W2112796928","https://openalex.org/W2157035150","https://openalex.org/W2159742886","https://openalex.org/W2177931787","https://openalex.org/W2209227144","https://openalex.org/W2216854803","https://openalex.org/W2251143283","https://openalex.org/W2271828218","https://openalex.org/W2572180805","https://openalex.org/W2583149885","https://openalex.org/W2592249290","https://openalex.org/W2826453723","https://openalex.org/W6688201194"],"related_works":["https://openalex.org/W3203175338","https://openalex.org/W2356901839","https://openalex.org/W3209501579","https://openalex.org/W2048100608","https://openalex.org/W2090296580","https://openalex.org/W1576249345","https://openalex.org/W4243905374","https://openalex.org/W1796074903","https://openalex.org/W4245955065","https://openalex.org/W4254967497"],"abstract_inverted_index":{"Cyberbullying":[0,16],"in":[1,43,52,86,112,125,141],"Online":[2],"Social":[3],"Networks":[4],"(OSNs)":[5],"has":[6,47],"emerged":[7],"as":[8,20],"one":[9],"of":[10,23,40,55,179,207],"the":[11,38,53,118,177],"most":[12],"severe":[13],"social":[14],"concerns.":[15],"can":[17,106,146,164,200],"be":[18,80,147,165],"described":[19],"a":[21,26,35,49,92,133,151,157,169,204],"form":[22],"bullying":[24],"where":[25,144],"perpetrator":[27],"uses":[28],"electronic":[29],"means":[30],"to":[31,34,60,74,83],"cause":[32],"harm":[33],"victim.":[36],"With":[37],"proliferation":[39],"smartphone":[41],"technology":[42],"present":[44],"times,":[45],"there":[46],"been":[48],"steady":[50],"shift":[51],"usage":[54],"OSNs":[56,143],"from":[57],"traditional":[58,75,126],"computers":[59],"mobile":[61,87,99,113,128,142,158,198],"devices.":[62],"However,":[63],"existing":[64],"systems":[65],"that":[66,105,121,196],"defend":[67],"against":[68],"cyberbullying":[69,85,100,111,123,139,145,152,162,202],"are":[70],"largely":[71],"applicable":[72],"only":[73],"computing":[76],"platforms":[77],"and":[78,109,127,160,172,184],"cannot":[79],"directly":[81],"applied":[82],"detect":[84,108,201],"platforms.":[88,129],"To":[89,175],"address":[90],"such":[91],"critical":[93],"issue,":[94],"we":[95,182],"investigate":[96,132],"an":[97,186],"innovative":[98],"defense":[101],"system":[102],"called":[103],"MCDefender":[104],"effectively":[107],"prevent":[110],"OSNs.":[114,210],"We":[115,130],"first":[116],"analyze":[117],"key":[119],"challenges":[120],"differentiate":[122],"conditions":[124],"then":[131],"two-level":[134],"detection":[135,140],"mechanism":[136],"for":[137,209],"comprehensive":[138],"quickly":[148],"detected":[149,167],"before":[150],"message":[153],"is":[154],"sent":[155],"through":[156,168],"device":[159],"hidden":[161],"attacks":[163],"also":[166],"more":[170],"fine-grained":[171],"context-aware":[173],"analysis.":[174],"demonstrate":[176],"feasibility":[178],"our":[180,197],"approach,":[181],"implement":[183],"evaluate":[185],"Android":[187],"application":[188,199],"based":[189],"on":[190],"MCDefender.":[191],"Our":[192],"evaluation":[193],"results":[194],"show":[195],"with":[203],"high":[205],"accuracy":[206],"98.9%":[208]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2017-04-07T00:00:00"}
