{"id":"https://openalex.org/W7124422231","doi":"https://doi.org/10.23919/jcin.2025.11357502","title":"A Sensitive Information Mimetic Classification Algorithm Based on Intelligent Algorithms","display_name":"A Sensitive Information Mimetic Classification Algorithm Based on Intelligent Algorithms","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7124422231","doi":"https://doi.org/10.23919/jcin.2025.11357502"},"language":null,"primary_location":{"id":"doi:10.23919/jcin.2025.11357502","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2025.11357502","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100443344","display_name":"Lingling Li","orcid":"https://orcid.org/0000-0001-7697-5937"},"institutions":[{"id":"https://openalex.org/I4210157581","display_name":"Jiangsu Police Officer College","ror":"https://ror.org/04k1m2t10","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210157581"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingling Li","raw_affiliation_strings":["Department of Cyber Security, Henan Police College, Zhengzhou 450000, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Henan Police College, Zhengzhou 450000, China","institution_ids":["https://openalex.org/I4210157581"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100443344"],"corresponding_institution_ids":["https://openalex.org/I4210157581"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.83786864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"4","first_page":"425","last_page":"434"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.31220000982284546,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.31220000982284546,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.09260000288486481,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.057999998331069946,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7889999747276306},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.6123999953269958},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6028000116348267},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5278000235557556},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4887000024318695},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4156000018119812},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3928000032901764},{"id":"https://openalex.org/keywords/sentiment-analysis","display_name":"Sentiment analysis","score":0.36880001425743103},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.3666999936103821}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8209999799728394},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7889999747276306},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.6123999953269958},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6028000116348267},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5278000235557556},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5041999816894531},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4887000024318695},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48350000381469727},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4156000018119812},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3928000032901764},{"id":"https://openalex.org/C66402592","wikidata":"https://www.wikidata.org/wiki/Q2271421","display_name":"Sentiment analysis","level":2,"score":0.36880001425743103},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.36399999260902405},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3522999882698059},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.34139999747276306},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.303600013256073},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.30000001192092896},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28209999203681946},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2745000123977661},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.25589999556541443},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/jcin.2025.11357502","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2025.11357502","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.5622745156288147,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,46,64,76,218],"era":[2],"of":[3,29,78,201],"exponential":[4],"Internet":[5],"growth,":[6],"social":[7,73],"media":[8],"platforms":[9],"have":[10],"become":[11],"indispensable":[12],"channels":[13],"for":[14,36,67,140,234],"daily":[15],"communication.":[16],"However,":[17],"this":[18,127],"digital":[19],"ecosystem":[20],"harbors":[21],"a":[22,146],"dual":[23],"challenge:":[24],"1)":[25],"users":[26,69],"transmit":[27],"information":[28,81,257],"varying":[30],"sensitivity,":[31],"demanding":[32],"differentiated":[33],"security":[34],"measures":[35],"critical":[37,138],"data":[38],"(e.g.,":[39,104,156],"encrypted":[40],"transmission)":[41],"versus":[42],"general":[43],"content;":[44],"2)":[45],"Internet\u2019s":[47],"anonymity":[48],"enables":[49,187],"malicious":[50],"actors":[51],"to":[52,111],"spread":[53],"harmful":[54],"content\u2014often":[55],"embedding":[56],"sensitive":[57,80,256],"information.":[58],"Such":[59],"dissemination":[60],"not":[61],"only":[62],"degrades":[63],"online":[65],"experience":[66],"legitimate":[68],"but":[70,237],"also":[71],"threatens":[72],"stability,":[74],"underscoring":[75],"urgency":[77],"robust":[79],"classification.":[82],"Sensitive":[83],"texts":[84],"exacerbate":[85],"these":[86],"challenges:":[87],"they":[88],"typically":[89],"manifest":[90],"as":[91],"short":[92],"messages":[93],"with":[94,126,226],"sparse":[95],"semantic":[96],"features,":[97],"fragmented":[98],"syntax,":[99],"and":[100,180,195,214,224],"deliberate":[101],"lexical":[102],"obfuscations":[103],"phonetic":[105],"substitutions":[106],"or":[107,122],"deformed":[108],"word":[109],"forms)":[110],"evade":[112],"rule-based":[113],"detection.":[114],"Traditional":[115],"methods":[116,231],"relying":[117],"on":[118,206],"manually":[119],"curated":[120],"dictionaries":[121],"fixed":[123],"rules":[124],"struggle":[125],"dynamism,":[128],"while":[129],"collected":[130],"datasets":[131,210],"often":[132],"suffer":[133],"from":[134],"severe":[135],"class":[136],"imbalance\u2014a":[137],"limitation":[139],"supervised":[141],"learning.":[142],"This":[143,185],"paper":[144],"introduces":[145],"heterogeneous":[147],"mimetic":[148,227],"classification":[149,258],"framework":[150,219,243],"that":[151],"transcends":[152],"conventional":[153],"ensemble":[154],"approaches":[155],"XGBoost).":[157],"Unlike":[158],"homogeneous":[159],"ensembles,":[160],"its":[161,251],"innovation":[162],"lies":[163],"in":[164,239,253],"integrating":[165],"diverse":[166],"model":[167],"paradigms:":[168],"prior-probability":[169],"models":[170,223],"[e.g.,":[171],"support":[172],"vector":[173,249],"machine":[174],"(SVM)],":[175],"posterior-probability":[176],"networks,":[177],"attention-based":[178],"architectures,":[179],"large":[181],"pre-trained":[182,222],"language":[183],"models.":[184,203],"design":[186],"adaptive":[188],"knowledge":[189],"fusion,":[190],"enhancing":[191],"both":[192],"cross-domain":[193],"adaptability":[194],"interpretability":[196],"by":[197],"leveraging":[198],"complementary":[199],"strengths":[200],"different":[202],"Experimental":[204],"validation":[205],"newly":[207],"created":[208],"Chinese":[209],"(covering":[211],"7":[212],"macro-categories":[213],"59":[215],"sub-categories)":[216],"compares":[217],"against":[220],"state-of-the-art":[221],"SVM":[225],"strategies.":[228],"While":[229],"SVM-based":[230],"perform":[232],"adequately":[233],"low-dimensional":[235],"vectors":[236],"falter":[238],"high-dimensional":[240],"spaces,":[241],"our":[242],"demonstrates":[244],"consistent":[245],"superiority":[246],"across":[247],"all":[248],"dimensions\u2014highlighting":[250],"efficacy":[252],"handling":[254],"real-world":[255],"tasks.":[259]},"counts_by_year":[],"updated_date":"2026-01-17T23:15:25.596738","created_date":"2026-01-17T00:00:00"}
