{"id":"https://openalex.org/W3112920084","doi":"https://doi.org/10.1145/3427228.3427603","title":"dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets","display_name":"dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3112920084","doi":"https://doi.org/10.1145/3427228.3427603","mag":"3112920084"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427603","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427603","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100395348","display_name":"Yiming Zhang","orcid":"https://orcid.org/0000-0001-5272-9192"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yiming Zhang","raw_affiliation_strings":["Case Western Reserve University, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064649082","display_name":"Yiyue Qian","orcid":"https://orcid.org/0000-0003-4288-7941"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yiyue Qian","raw_affiliation_strings":["Case Western Reserve University, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101916154","display_name":"Yujie Fan","orcid":"https://orcid.org/0000-0002-2635-9420"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yujie Fan","raw_affiliation_strings":["Case Western Reserve University, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027601906","display_name":"Yanfang Ye","orcid":"https://orcid.org/0000-0002-6038-2173"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanfang Ye","raw_affiliation_strings":["Case Western Reserve University, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100354039","display_name":"Xin Li","orcid":"https://orcid.org/0000-0003-2067-2763"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xin Li","raw_affiliation_strings":["West Virginia University, USA"],"affiliations":[{"raw_affiliation_string":"West Virginia University, USA","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000664704","display_name":"Qi Xiong","orcid":"https://orcid.org/0000-0001-8690-565X"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Xiong","raw_affiliation_strings":["Tencent Security Lab, China"],"affiliations":[{"raw_affiliation_string":"Tencent Security Lab, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112459853","display_name":"Fudong Shao","orcid":null},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fudong Shao","raw_affiliation_strings":["Tencent Security Lab, China"],"affiliations":[{"raw_affiliation_string":"Tencent Security Lab, China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100395348"],"corresponding_institution_ids":["https://openalex.org/I58956616"],"apc_list":null,"apc_paid":null,"fwci":4.4561,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95986395,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"669","last_page":"680"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.737376868724823},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.56989985704422},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.5516223311424255},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5448217391967773},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.525409460067749},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5142351984977722},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.49991703033447266},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4719250202178955},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.46038389205932617},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.45040163397789},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4453516900539398},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3935937285423279},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38272547721862793},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3718373775482178},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1939816176891327},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10108238458633423}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.737376868724823},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.56989985704422},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.5516223311424255},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5448217391967773},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.525409460067749},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5142351984977722},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.49991703033447266},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4719250202178955},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.46038389205932617},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.45040163397789},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4453516900539398},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3935937285423279},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38272547721862793},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3718373775482178},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1939816176891327},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10108238458633423},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3427228.3427603","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427603","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/5"}],"awards":[{"id":"https://openalex.org/G4403663715","display_name":null,"funder_award_id":"IIS-2027127, IIS-2040144, IIS-1951504, CNS-2034470, CNS-1940859, CNS-1946327, CNS-1814825, OAC-1940855, and ECCS-2026612.","funder_id":"https://openalex.org/F4320322898","funder_display_name":"Shota Rustaveli National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322898","display_name":"Shota Rustaveli National Science Foundation","ror":"https://ror.org/00xc87681"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W229583245","https://openalex.org/W1514527998","https://openalex.org/W1686810756","https://openalex.org/W1888005072","https://openalex.org/W2085984130","https://openalex.org/W2113341218","https://openalex.org/W2152416372","https://openalex.org/W2154851992","https://openalex.org/W2170240176","https://openalex.org/W2292748019","https://openalex.org/W2294926726","https://openalex.org/W2345504771","https://openalex.org/W2443488742","https://openalex.org/W2556817030","https://openalex.org/W2732916693","https://openalex.org/W2743104969","https://openalex.org/W2744097819","https://openalex.org/W2767560037","https://openalex.org/W2767774008","https://openalex.org/W2783755104","https://openalex.org/W2784777439","https://openalex.org/W2786210296","https://openalex.org/W2791045629","https://openalex.org/W2806633875","https://openalex.org/W2808154606","https://openalex.org/W2932870978","https://openalex.org/W2949547296","https://openalex.org/W2952343887","https://openalex.org/W2984239289","https://openalex.org/W2984482968","https://openalex.org/W2988701063","https://openalex.org/W3000248926","https://openalex.org/W3012857244","https://openalex.org/W3104097132","https://openalex.org/W3105705953","https://openalex.org/W4231393767"],"related_works":["https://openalex.org/W2888032422","https://openalex.org/W2996316059","https://openalex.org/W3156763702","https://openalex.org/W4385421777","https://openalex.org/W4377980832","https://openalex.org/W2897769091","https://openalex.org/W2971552217","https://openalex.org/W2969215546","https://openalex.org/W3005996785","https://openalex.org/W4297411772"],"abstract_inverted_index":{"Despite":[0],"the":[1,50,77,102,110,139,160,188,208,213,217,254,261,266,271,284],"persistent":[2],"effort":[3],"by":[4,85,197,273],"law":[5,300],"enforcement,":[6],"illicit":[7,37,55,289],"drug":[8,38,56,80,268,290],"trafficking":[9],"in":[10,63,82,106,270,293],"darknet":[11,83,115,251,294],"markets":[12,19,252],"has":[13],"shown":[14],"great":[15],"resilience":[16],"with":[17],"new":[18],"rapidly":[20],"appearing":[21],"after":[22],"old":[23],"ones":[24],"being":[25],"shut":[26],"down.":[27],"In":[28],"order":[29],"to":[30,44,75,126,158,170,224,279],"more":[31],"effectively":[32],"detect,":[33],"disrupt":[34],"and":[35,52,68,89,131,135,138,144,167,192,228,253,286],"dismantle":[36],"trades,":[39],"there\u2019s":[40],"an":[41,70,120],"imminent":[42],"need":[43],"gain":[45,280],"a":[46,95,148],"deeper":[47,281],"understanding":[48],"toward":[49],"operations":[51],"dynamics":[53,285],"of":[54,98,163,174,190,210,288],"trading":[57,291],"activities.":[58],"To":[59,92,207],"address":[60],"this":[61,64],"challenge,":[62],"paper,":[65],"we":[66,117,146,275],"design":[67],"develop":[69],"intelligent":[71],"system":[72],"(named":[73],"dSytle-GAN)":[74],"automate":[76],"analysis":[78,278],"for":[79,176,200,237,302],"identification":[81],"markets,":[84,116,295],"considering":[86],"both":[87],"content-based":[88],"style-aware":[90],"information.":[91],"determine":[93],"whether":[94],"given":[96],"pair":[97],"posted":[99,164],"drugs":[100,175,195],"are":[101],"same":[103],"or":[104],"not,":[105],"dStyle-GAN,":[107,274],"based":[108,154,244],"on":[109,245,265],"large-scale":[111,246],"data":[112],"collected":[113,248],"from":[114,249],"first":[118,218],"present":[119],"attributed":[121],"heterogeneous":[122],"information":[123],"network":[124,152,191],"(AHIN)":[125],"depict":[127],"drugs,":[128],"vendors,":[129],"texts":[130],"writing":[132,166,227],"styles,":[133,137],"photos":[134],"photography":[136,168,229],"rich":[140],"relations":[141],"among":[142],"them;":[143],"then":[145],"propose":[147],"novel":[149],"generative":[150],"adversarial":[151],"(GAN)":[153],"model":[155,185],"over":[156,194,222],"AHIN":[157],"capture":[159],"underlying":[161],"distribution":[162],"drugs\u2019":[165],"styles":[169,230],"learn":[171],"robust":[172,201],"representations":[173],"their":[177,234],"identifications.":[178],"Unlike":[179],"existing":[180],"approaches,":[181],"our":[182,211],"proposed":[183,214],"GAN-based":[184,220],"jointly":[186],"considers":[187],"heterogeneity":[189],"relatedness":[193],"formulated":[196],"domain-specific":[198],"meta-paths":[199],"node":[202,238],"(i.e.,":[203],"drug)":[204],"representation":[205,239],"learning.":[206,240],"best":[209],"knowledge,":[212],"dStyle-GAN":[215,259],"represents":[216],"principled":[219],"solution":[221],"graphs":[223],"simultaneously":[225],"consider":[226],"as":[231,233],"well":[232],"latent":[235],"distributions":[236],"Extensive":[241],"experimental":[242],"results":[243],"datasets":[247],"six":[250],"obtained":[255],"ground-truth":[256],"demonstrate":[257],"that":[258],"outperforms":[260],"state-of-the-art":[262],"methods.":[263],"Based":[264],"identified":[267],"pairs":[269],"wild":[272],"perform":[276],"further":[277],"insights":[282],"into":[283],"evolution":[287],"activities":[292],"whose":[296],"findings":[297],"may":[298],"facilitate":[299],"enforcement":[301],"proactive":[303],"interventions.":[304]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
