{"id":"https://openalex.org/W4206178224","doi":"https://doi.org/10.1145/3491396.3506525","title":"Darknet Public Hazard Entity Recognition Based on Deep Learning","display_name":"Darknet Public Hazard Entity Recognition Based on Deep Learning","publication_year":2021,"publication_date":"2021-12-28","ids":{"openalex":"https://openalex.org/W4206178224","doi":"https://doi.org/10.1145/3491396.3506525"},"language":"en","primary_location":{"id":"doi:10.1145/3491396.3506525","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3491396.3506525","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3491396.3506525","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3491396.3506525","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100411732","display_name":"Panpan Zhang","orcid":"https://orcid.org/0000-0001-9852-546X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Panpan Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066857796","display_name":"Xuebin Wang","orcid":"https://orcid.org/0000-0002-0809-6014"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuebin Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039094834","display_name":"Jing Ya","orcid":"https://orcid.org/0009-0003-6646-3278"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Ya","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101008117","display_name":"Jiapeng Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiapeng Zhao","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080686378","display_name":"Tingwen Liu","orcid":"https://orcid.org/0000-0002-0750-6923"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tingwen Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110292528","display_name":"Jinqiao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinqiao Shi","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100411732"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.377,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85981469,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"94","last_page":"100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8306593298912048},{"id":"https://openalex.org/keywords/word2vec","display_name":"Word2vec","score":0.5837751626968384},{"id":"https://openalex.org/keywords/named-entity-recognition","display_name":"Named-entity recognition","score":0.5702915787696838},{"id":"https://openalex.org/keywords/hazard","display_name":"Hazard","score":0.5281267762184143},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.519719123840332},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.50213623046875},{"id":"https://openalex.org/keywords/entity-linking","display_name":"Entity linking","score":0.4864630401134491},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.43980279564857483},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4200182259082794},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3912751078605652},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.38841548562049866},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.3622839152812958},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33948904275894165},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.11681261658668518}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8306593298912048},{"id":"https://openalex.org/C2776461190","wikidata":"https://www.wikidata.org/wiki/Q22673982","display_name":"Word2vec","level":3,"score":0.5837751626968384},{"id":"https://openalex.org/C2779135771","wikidata":"https://www.wikidata.org/wiki/Q403574","display_name":"Named-entity recognition","level":3,"score":0.5702915787696838},{"id":"https://openalex.org/C49261128","wikidata":"https://www.wikidata.org/wiki/Q1132455","display_name":"Hazard","level":2,"score":0.5281267762184143},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.519719123840332},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.50213623046875},{"id":"https://openalex.org/C96711827","wikidata":"https://www.wikidata.org/wiki/Q17012245","display_name":"Entity linking","level":3,"score":0.4864630401134491},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.43980279564857483},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4200182259082794},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3912751078605652},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.38841548562049866},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3622839152812958},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33948904275894165},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.11681261658668518},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3491396.3506525","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3491396.3506525","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3491396.3506525","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3491396.3506525","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3491396.3506525","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3491396.3506525","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4206178224.pdf","grobid_xml":"https://content.openalex.org/works/W4206178224.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1825157170","https://openalex.org/W1982982698","https://openalex.org/W2020278455","https://openalex.org/W2034921015","https://openalex.org/W2064675550","https://openalex.org/W2079735306","https://openalex.org/W2142384583","https://openalex.org/W2147880316","https://openalex.org/W2296283641","https://openalex.org/W2559281960","https://openalex.org/W2567070169","https://openalex.org/W2626176522","https://openalex.org/W2769387903","https://openalex.org/W2807880213","https://openalex.org/W2896457183","https://openalex.org/W2948947170","https://openalex.org/W2957698615","https://openalex.org/W2974511542","https://openalex.org/W2990714382","https://openalex.org/W3006272233","https://openalex.org/W3104774463","https://openalex.org/W3154818064","https://openalex.org/W3165688004","https://openalex.org/W4235422164","https://openalex.org/W4298442577","https://openalex.org/W6736733487","https://openalex.org/W6774113080"],"related_works":["https://openalex.org/W4205454697","https://openalex.org/W2186562580","https://openalex.org/W3198729192","https://openalex.org/W2621151902","https://openalex.org/W3000685722","https://openalex.org/W4255258373","https://openalex.org/W2593907245","https://openalex.org/W2520117834","https://openalex.org/W2883921205","https://openalex.org/W4313162113"],"abstract_inverted_index":{"Due":[0],"to":[1,13,42,96,116,172,194],"the":[2,49,55,64,79,123,128,139,144,188,211],"strong":[3],"protection":[4],"of":[5,35,57,66,213],"anonymity,":[6],"Darknet":[7,80,189,214],"has":[8],"been":[9],"exploited":[10],"by":[11,131,142],"criminals":[12],"distribute":[14],"harmful":[15],"content":[16],"and":[17,24,44,72,87,134,137,190],"banned":[18],"items,":[19],"such":[20],"as":[21,29],"drugs,":[22],"weapons,":[23],"malware,":[25],"which":[26,92],"are":[27],"regarded":[28],"public":[30,36,59,75,119,215],"hazard":[31,37,60,76,120,216],"entities.":[32,217],"The":[33,198],"task":[34],"entity":[38,61,101,170],"recognition":[39,62,102,171,212],"can":[40],"help":[41],"detect":[43],"analyze":[45],"malicious":[46],"activities":[47],"in":[48,63,78,89,122,167,187],"Darknet.":[50,124],"This":[51],"paper":[52],"focuses":[53],"on":[54,210],"research":[56],"Chinese":[58,74,118],"field":[65],"illegal":[67],"drugs.":[68],"To":[69],"evade":[70],"detection":[71],"surveillance,":[73],"entities":[77,121],"usually":[81],"utilize":[82],"disguised":[83],"forms,":[84],"like":[85],"homophones":[86],"multi-entities":[88],"a":[90,161,181,207],"sentence,":[91],"makes":[93],"it":[94],"harder":[95],"identify":[97,117],"them":[98],"using":[99],"traditional":[100],"methods.":[103],"In":[104],"this":[105],"paper,":[106],"we":[107,126,155,179],"present":[108],"an":[109],"effective":[110],"deep":[111],"learning-based":[112],"multi-information":[113],"fusion":[114],"model":[115,205],"Specifically,":[125],"introduce":[127],"grammatical":[129],"information":[130],"adding":[132,143],"Pinyin":[133],"lexical":[135],"features,":[136],"strengthen":[138],"semantic":[140],"features":[141],"word":[145],"vectors":[146],"from":[147,184],"one":[148],"advanced":[149],"pre-trained":[150],"language":[151],"representation":[152],"model.":[153,176,197],"Then":[154],"combine":[156],"these":[157],"three":[158],"parts":[159],"with":[160],"classical":[162],"sequence":[163],"annotation":[164],"architecture":[165],"used":[166],"general":[168],"named":[169],"form":[173],"our":[174,196,203],"ultimate":[175],"At":[177],"last":[178],"construct":[180],"real":[182],"dataset":[183],"drugs-related":[185],"groups":[186],"conduct":[191],"several":[192],"experiments":[193],"evaluate":[195],"experimental":[199],"result":[200],"verifies":[201],"that":[202],"proposed":[204],"gains":[206],"good":[208],"performance":[209]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
