You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
暂无分享,去创建一个
Gang Wang | Chun Wang | Peng Peng | Xiangwen Wang | G. Wang | C. Wang | Xiangwen Wang | Peng Peng
[1] Nigel Shadbolt,et al. Structural analysis of online criminal social networks , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[2] Ivan Laptev,et al. Learning and Transferring Mid-level Image Representations Using Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[3] Damon McCoy,et al. Honor among thieves: A common's analysis of cybercrime economies , 2013, 2013 APWG eCrime Researchers Summit.
[4] Edmund Y. Lam,et al. Source camera identification using footprints from lens aberration , 2006, Electronic Imaging.
[5] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[7] Yang Song,et al. Improving the Robustness of Deep Neural Networks via Stability Training , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[9] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[10] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[11] Prateek Mittal,et al. Dimensionality Reduction as a Defense against Evasion Attacks on Machine Learning Classifiers , 2017, ArXiv.
[12] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[13] Florent Retraint,et al. Individual camera device identification from JPEG images , 2017, Signal Process. Image Commun..
[14] Vern Paxson,et al. Tools for Automated Analysis of Cybercriminal Markets , 2017, WWW.
[15] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[16] Wee Keong Ng,et al. Application of Stylometry to DarkWeb Forum User Identification , 2016, ICICS.
[17] Gianluca Stringhini,et al. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns , 2011, LEET.
[18] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[19] Gianluca Stringhini,et al. All your cards are belong to us: Understanding online carding forums , 2016, 2017 APWG Symposium on Electronic Crime Research (eCrime).
[20] Dan Klein,et al. Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network , 2003, NAACL.
[21] Emiliano De Cristofaro,et al. Characterizing key stakeholders in an online black-hat marketplace , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).
[22] Ariel Stolerman,et al. Doppelgänger Finder: Taking Stylometry to the Underground , 2014, 2014 IEEE Symposium on Security and Privacy.
[23] Arvind Narayanan,et al. De-anonymizing Programmers via Code Stylometry , 2015, USENIX Security Symposium.
[24] Joseph Le Roux,et al. Foreebank: Syntactic Analysis of Customer Support Forums , 2015, EMNLP.
[25] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[26] Nicolas Christin,et al. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem , 2015, USENIX Security Symposium.
[27] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[28] Eugenio Culurciello,et al. An Analysis of Deep Neural Network Models for Practical Applications , 2016, ArXiv.
[29] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[30] Luc Van Gool,et al. What is Around the Camera? , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[31] Li Wang,et al. Tagging and Linking Web Forum Posts , 2010, CoNLL.
[32] Florent Retraint,et al. Camera model identification based on the generalized noise model in natural images , 2016, Digit. Signal Process..
[33] Vern Paxson,et al. Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation , 2017, EMNLP.
[34] Moustapha Cissé,et al. Countering Adversarial Images using Input Transformations , 2018, ICLR.
[35] Terrance E. Boult,et al. Adversarial Diversity and Hard Positive Generation , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[36] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[37] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[39] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[40] Sree Hari Krishnan Parthasarathi,et al. Exploiting innocuous activity for correlating users across sites , 2013, WWW.
[41] Timothy Baldwin,et al. Classifying User Forum Participants: Separating the Gurus from the Hacks, and Other Tales of the Internet , 2010, ALTA.
[42] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[43] Ronald M. Summers,et al. Deep Convolutional Neural Networks for Computer-Aided Detection: CNN Architectures, Dataset Characteristics and Transfer Learning , 2016, IEEE Transactions on Medical Imaging.
[44] Stefan Savage,et al. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.
[45] Vern Paxson,et al. Profiling underground merchants based on network behavior , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).
[46] Adriana Kovashka,et al. Seeing Behind the Camera: Identifying the Authorship of a Photograph , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[47] Nima Tajbakhsh,et al. Convolutional Neural Networks for Medical Image Analysis: Full Training or Fine Tuning? , 2016, IEEE Transactions on Medical Imaging.
[48] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[49] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[50] Shmuel Peleg,et al. An Egocentric Look at Video Photographer Identity , 2014, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[52] Hao Chen,et al. MagNet: A Two-Pronged Defense against Adversarial Examples , 2017, CCS.
[53] Jia Li,et al. Image processing for artist identification , 2008, IEEE Signal Processing Magazine.
[54] Vaibhav Garg,et al. Computer-Supported Cooperative Crime , 2015, Financial Cryptography.
[55] Yanjun Qi,et al. Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks , 2017, NDSS.
[56] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.