{"id":"https://openalex.org/W2619095830","doi":"https://doi.org/10.1186/s13388-017-0029-8","title":"Semi-supervised learning for detecting human trafficking","display_name":"Semi-supervised learning for detecting human trafficking","publication_year":2017,"publication_date":"2017-05-11","ids":{"openalex":"https://openalex.org/W2619095830","doi":"https://doi.org/10.1186/s13388-017-0029-8","mag":"2619095830"},"language":"en","primary_location":{"id":"doi:10.1186/s13388-017-0029-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-017-0029-8","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-017-0029-8","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-017-0029-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000851902","display_name":"Hamidreza Alvari","orcid":"https://orcid.org/0000-0001-7172-0134"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hamidreza Alvari","raw_affiliation_strings":["Arizona State University, Tempe, Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, Arizona, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081115472","display_name":"Paulo Shakarian","orcid":"https://orcid.org/0000-0002-3159-4660"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paulo Shakarian","raw_affiliation_strings":["Arizona State University, Tempe, Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, Arizona, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109426213","display_name":"Jo-Ellen Snyder","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"J. E. Kelly Snyder","raw_affiliation_strings":["Find Me Group, Tempe, Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Find Me Group, Tempe, Arizona, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000851902"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":12.6472,"has_fulltext":true,"cited_by_count":63,"citation_normalized_percentile":{"value":0.98552435,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9592000246047974,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7964619398117065},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.7789404392242432},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7274502515792847},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7096520662307739},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.49709561467170715},{"id":"https://openalex.org/keywords/labeled-data","display_name":"Labeled data","score":0.4757273495197296},{"id":"https://openalex.org/keywords/regularization","display_name":"Regularization (linguistics)","score":0.47069740295410156},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.44475340843200684},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4241250157356262},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.4192821979522705},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4004471004009247},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3882113993167877},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3419244885444641},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3377026915550232},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.15244469046592712},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09002289175987244}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7964619398117065},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.7789404392242432},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7274502515792847},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7096520662307739},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.49709561467170715},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.4757273495197296},{"id":"https://openalex.org/C2776135515","wikidata":"https://www.wikidata.org/wiki/Q17143721","display_name":"Regularization (linguistics)","level":2,"score":0.47069740295410156},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.44475340843200684},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4241250157356262},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.4192821979522705},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4004471004009247},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3882113993167877},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3419244885444641},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3377026915550232},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.15244469046592712},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09002289175987244},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13388-017-0029-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-017-0029-8","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-017-0029-8","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e77caa8b52344671b9888ad6d11bec11","is_oa":true,"landing_page_url":"https://doaj.org/article/e77caa8b52344671b9888ad6d11bec11","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security Informatics, Vol 6, Iss 1, Pp 1-14 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13388-017-0029-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-017-0029-8","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-017-0029-8","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2619095830.pdf","grobid_xml":"https://content.openalex.org/works/W2619095830.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W328835304","https://openalex.org/W1565725288","https://openalex.org/W1638203394","https://openalex.org/W1929731315","https://openalex.org/W1963579188","https://openalex.org/W1981276685","https://openalex.org/W1995875735","https://openalex.org/W2048473385","https://openalex.org/W2048679005","https://openalex.org/W2104290444","https://openalex.org/W2107569009","https://openalex.org/W2119423198","https://openalex.org/W2119821739","https://openalex.org/W2154455818","https://openalex.org/W2187089797","https://openalex.org/W2222863356","https://openalex.org/W2282750467","https://openalex.org/W2305543783","https://openalex.org/W2401715402","https://openalex.org/W2508033145","https://openalex.org/W2514893530","https://openalex.org/W2582697902","https://openalex.org/W2963694862","https://openalex.org/W2978725006","https://openalex.org/W4239071388","https://openalex.org/W6604235661"],"related_works":["https://openalex.org/W3210196349","https://openalex.org/W4214728004","https://openalex.org/W2950181282","https://openalex.org/W2798287483","https://openalex.org/W2913410650","https://openalex.org/W4221146302","https://openalex.org/W2543240607","https://openalex.org/W3170999895","https://openalex.org/W4287117940","https://openalex.org/W34092691"],"abstract_inverted_index":{"Human":[0],"trafficking":[1,42],"is":[2,163],"one":[3],"of":[4,20,40,50,60,77,107,128,168],"the":[5,11,31,58,78,83,108,114,129,156],"most":[6],"atrocious":[7],"crimes":[8],"and":[9,47,87,119,122,149,152],"among":[10],"challenging":[12],"problems":[13],"facing":[14],"law":[15,54,70,172],"enforcement":[16],"which":[17,44],"demands":[18],"attention":[19],"global":[21],"magnitude.":[22],"In":[23],"this":[24],"study,":[25],"we":[26,63],"leverage":[27],"textual":[28],"data":[29,121,158],"from":[30,69,144],"website":[32],"\u201cBackpage\u201d\u2014used":[33],"for":[34,72],"classified":[35],"advertisement\u2014to":[36],"discern":[37],"potential":[38],"patterns":[39],"human":[41,67],"activities":[43],"manifest":[45],"online":[46],"identify":[48],"advertisements":[49,167],"high":[51,169],"interest":[52,170],"to":[53,57,96,134,171],"enforcement.":[55,173],"Due":[56],"lack":[59],"ground":[61],"truth,":[62],"rely":[64],"on":[65,125,155],"a":[66,74,93,126],"analyst":[68],"enforcement,":[71],"hand-labeling":[73],"small":[75],"portion":[76],"crawled":[79],"data.":[80],"We":[81,112],"extend":[82],"existing":[84],"Laplacian":[85],"SVM":[86],"present":[88],"$$S^3VM-R$$":[89],",":[90],"by":[91],"adding":[92],"regularization":[94],"term":[95],"exploit":[97],"exogenous":[98],"information":[99],"embedded":[100],"in":[101,105,165],"our":[102,139,147,161],"feature":[103],"space":[104],"favor":[106],"task":[109],"at":[110],"hand.":[111],"train":[113],"proposed":[115],"method":[116,148],"using":[117],"labeled":[118,157],"unlabeled":[120,130],"evaluate":[123],"it":[124],"fraction":[127],"data,":[131,137],"herein":[132],"referred":[133],"as":[135],"unseen":[136],"with":[138],"expert\u2019s":[140],"further":[141],"verification.":[142],"Results":[143],"comparisons":[145],"between":[146],"other":[150],"semi-supervised":[151],"supervised":[153],"approaches":[154],"demonstrate":[159],"that":[160],"learner":[162],"effective":[164],"identifying":[166]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-19T08:26:33.389920","created_date":"2025-10-10T00:00:00"}
