{"id":"https://openalex.org/W2806633875","doi":"https://doi.org/10.1145/3196494.3196529","title":"You Are Your Photographs","display_name":"You Are Your Photographs","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2806633875","doi":"https://doi.org/10.1145/3196494.3196529","mag":"2806633875"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196529","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196529","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196529","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196529","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068620302","display_name":"Xiangwen Wang","orcid":"https://orcid.org/0000-0002-4755-4639"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiangwen Wang","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100416333","display_name":"Peng Peng","orcid":"https://orcid.org/0000-0003-1204-9234"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Peng","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100367577","display_name":"Chun Wang","orcid":"https://orcid.org/0000-0002-4248-5873"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chun Wang","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100367421","display_name":"Gang Wang","orcid":"https://orcid.org/0000-0002-9297-136X"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Wang","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068620302"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":1.2749,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.85014908,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"431","last_page":"442"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7890242338180542},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.5711467266082764},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.508880615234375},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.4866524636745453},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.458542138338089},{"id":"https://openalex.org/keywords/visual-analytics","display_name":"Visual analytics","score":0.4235376715660095},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.41747021675109863},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4140811562538147},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4056832492351532},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3417011499404907},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3054407238960266},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.13211360573768616},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11067363619804382}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7890242338180542},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.5711467266082764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.508880615234375},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.4866524636745453},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.458542138338089},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.4235376715660095},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.41747021675109863},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4140811562538147},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4056832492351532},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3417011499404907},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3054407238960266},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.13211360573768616},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11067363619804382},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3196494.3196529","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196529","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196529","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3196494.3196529","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3196529","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3196529","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3797189155","display_name":null,"funder_award_id":"CNS-1717028","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7007538415","display_name":"SaTC: CORE: Small: Securing Web-to-Mobile Interface Through Characterization and Detection of Malicious Deep Links","funder_award_id":"1717028","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2806633875.pdf","grobid_xml":"https://content.openalex.org/works/W2806633875.grobid-xml"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W1463623766","https://openalex.org/W1655958391","https://openalex.org/W1686810756","https://openalex.org/W1984038043","https://openalex.org/W1996430422","https://openalex.org/W2010452738","https://openalex.org/W2026195300","https://openalex.org/W2029103396","https://openalex.org/W2061280906","https://openalex.org/W2096754397","https://openalex.org/W2108240927","https://openalex.org/W2113341218","https://openalex.org/W2113839561","https://openalex.org/W2117539524","https://openalex.org/W2122551442","https://openalex.org/W2124695272","https://openalex.org/W2134385885","https://openalex.org/W2141230360","https://openalex.org/W2161381512","https://openalex.org/W2174869877","https://openalex.org/W2176637712","https://openalex.org/W2180612164","https://openalex.org/W2187074748","https://openalex.org/W2194775991","https://openalex.org/W2233336373","https://openalex.org/W2243397390","https://openalex.org/W2251904970","https://openalex.org/W2253429366","https://openalex.org/W2269520727","https://openalex.org/W2342045095","https://openalex.org/W2346062110","https://openalex.org/W2346735539","https://openalex.org/W2418848579","https://openalex.org/W2419597278","https://openalex.org/W2460937040","https://openalex.org/W2463692710","https://openalex.org/W2554218322","https://openalex.org/W2569045678","https://openalex.org/W2604955674","https://openalex.org/W2618043096","https://openalex.org/W2618530766","https://openalex.org/W2741645903","https://openalex.org/W2765384636","https://openalex.org/W2919115771","https://openalex.org/W2962795608","https://openalex.org/W2962880358","https://openalex.org/W2963207607","https://openalex.org/W2963298379","https://openalex.org/W2963857521","https://openalex.org/W2964044378","https://openalex.org/W2964153729","https://openalex.org/W3098755929"],"related_works":["https://openalex.org/W4293226380","https://openalex.org/W4321487865","https://openalex.org/W4313906399","https://openalex.org/W2744288354","https://openalex.org/W2339806289","https://openalex.org/W4391266461","https://openalex.org/W2590798552","https://openalex.org/W2811106690","https://openalex.org/W2062940763","https://openalex.org/W2186032312"],"abstract_inverted_index":{"Darknet":[0],"markets":[1,28,42,161,201,206],"are":[2],"online":[3],"services":[4],"behind":[5],"Tor":[6],"where":[7],"cybercriminals":[8,58],"trade":[9],"illegal":[10,105],"goods":[11],"and":[12,20,34,59,164,187,203,226,229],"stolen":[13],"datasets.":[14],"In":[15,63,189],"recent":[16],"years,":[17],"security":[18],"analysts":[19],"law":[21],"enforcement":[22],"start":[23],"to":[24,29,53,71,93,99,124,133,140],"investigate":[25],"the":[26,31,55,73,77,101,104,126,134,152,173,199,216],"darknet":[27,79,89,160],"study":[30],"cybercriminal":[32],"networks":[33,123],"predict":[35],"future":[36],"incidents.":[37],"However,":[38],"vendors":[39,80,90,143,163],"in":[40,184],"these":[41],"often":[43,91],"create":[44],"multiple":[45,74],"accounts":[46,75,197],"(\\em":[47],"i.e.,":[48],"Sybils),":[49],"making":[50],"it":[51],"challenging":[52],"infer":[54],"relationships":[56],"between":[57],"identify":[60],"coordinated":[61,217],"crimes.":[62],"this":[64],"paper,":[65],"we":[66,117],"present":[67],"a":[68,119,145],"novel":[69],"approach":[70],"link":[72],"of":[76,103,148,178],"same":[78,200],"through":[81],"photo":[82],"analytics.":[83],"The":[84],"core":[85],"idea":[86],"is":[87],"that":[88,172],"have":[92],"take":[94],"their":[95,110],"own":[96],"product":[97,166,227],"photos":[98],"prove":[100],"possession":[102],"goods,":[106],"which":[107,137],"can":[108],"reveal":[109,212],"distinct":[111],"photography":[112,127],"styles.":[113,128],"To":[114],"fingerprint":[115,142],"vendors,":[116],"construct":[118],"series":[120],"deep":[121],"neural":[122],"model":[125,135],"We":[129,150],"apply":[130],"transfer":[131],"learning":[132],"training,":[136],"allows":[138],"us":[139],"accurately":[141],"with":[144],"limited":[146],"number":[147],"photos.":[149],"evaluate":[151],"system":[153,174,192],"using":[154],"real-world":[155],"datasets":[156],"from":[157],"3":[158],"large":[159],"(7,641":[162],"197,682":[165],"photos).":[167],"A":[168],"ground-truth":[169],"evaluation":[170],"shows":[171],"achieves":[175],"an":[176],"accuracy":[177,186],"97.5%,":[179],"outperforming":[180],"existing":[181],"stylometry-based":[182],"methods":[183],"both":[185],"coverage.":[188],"addition,":[190],"our":[191],"identifies":[193],"previously":[194],"unknown":[195],"Sybil":[196,218],"within":[198],"(23)":[202],"across":[204],"different":[205],"(715":[207],"pairs).":[208],"Further":[209],"case":[210],"studies":[211],"new":[213],"insights":[214],"into":[215],"activities":[219],"such":[220],"as":[221],"price":[222],"manipulation,":[223],"buyer":[224],"scam,":[225],"stocking":[228],"reselling.":[230]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
