Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241100171-10.doi: 10.11896/jsjkx.241100171
• Image Processing & Multimedia Technology • Previous Articles Next Articles
ZHAO Chunlei1,2, YU Jie1,2, WANG Pengxiang3, YOU Wei1,2
CLC Number:
| [1]YANG H,DU K,ZHANG Y,et al.Casino royale:A deep exploration of illegal online gambling[C]//Proceedings of the 35th Annual Computer Security Applications Conference.2019:9-13. [2]BANKS J.Gambling,Problem Gambling,Crime and the Criminal Justice System[M]//Gambling,Crime and Society.Palgrave Macmillan,London,2017:63-109. [3]GAO Y,WANG H,LI L,et al.Demystifying Illegal MobileGambling Apps[C]//Proceedings of Web Confence.2021:1447-1458. [4]SAHOO D,LIU C,HOI S.Malicious URL Detection using Machine Learning:A Survey[J].arXiv:1701.07179,2017. [5]PRAKASH P,KUMAR M,KOMPELLAR,et al.Phishnet:Predictive blacklisting to detect phishing attacks[C]//Proceedings of the 2010 Proceedings IEEE INFOCOM.2010:1-5. [6]LE H,PHAM Q,SAHOO D,et al.URLNet:Learning a URL Representation with Deep Learning for Malicious URL Detection[J].arXiv:1802.03162,2018. [7]GARERA S,PROVOS N,CHEW M,et al.A framework for detection and measurement of phishing attacks[C]//Proceedings of the 2007 ACM workshop on Recurring malcode.2007:1-8. [8]HUANG Y,YANG Q,QIN J,et al.Phishing URL Detection via CNN and Attention-Based Hierarchical RNN[C]//Proceedings of the 2019 18th IEEE International Conference on Trust,Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering(TrustCom/BigDataSE).2019:112-119. [9]MA J,SAUL L,SAVAGE S,et al.Beyond blacklists:Learning to detect malicious web sites from suspicious URLs[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:1245-1254. [10]SHIN J,LEE S,WANG T.Semantic Approach for Identifying Harmful Sites Using the Link Relations[C]//Proceedings of the 2014 IEEE International Conference on Semantic Computing.2014:256-257. [11]SHEU J.Distinguishing Medical Web Pages from Pornographic Ones:An Efficient Pornography Websites Filtering Method[J].International Journal of Network Security,2017,19(5):839-850. [12]LIU D,LEE J H,WANG W,et al.Malicious websites detection via cnn based screenshot recognition[C]//Proceedings of the 2019 IEEE International Conference on Intelligent Computing and its Emerging Applications(ICEA).2019:115-119. [13]ZHANG D.Research and Implementation of Content-OrientedWeb page Classification[D].Nanjing:Nanjing University of Posts and Telecommunications,2017. [14]SUN G,YE F,CHAI T,et al.Gambling Domain Name Recognition via Certificate and Textual Analysis[J].The Computer Journal,2023,66(8):1829-1839. [15]LI L,GOU G,XIONG G,et al.Identifying Gambling and Porn Websites with Image Recognition[C]//Pacific Rim Conference on Multimedia.Berlin:Springer,2017:488-497. [16]YUAN K,TANG D,LIAO X,et al.Stealthy Porn:Understan-ding Real-World Adversarial Images for Illicit Online Promotion[C]//Proceedings of the 2019 IEEE Symposium on Security and Privacy(SP).2019:952-966. [17]JAIN A.K,GUPTAB B.A machine learning based approach for phishing detection using hyperlinks information[J].Journal of Ambient Intelligence and Humanized Computing,2019,10:2015-2028. [18]PAUL S,SAHA S,HASANUZZAMANM.Identification of cyberbullying:A deep learning based multimodal approach[J].Multimedia Tools and Applications,2022,81:26989-27008. [19]AL-KHASAWNEH M A,FAHEEM M,ALAROOD A A,et al.Towards Multi-Modal Approach for Identification and Detection of Cyberbullying in Social Networks[J].IEEE Access,2024,12:90158-90170. [20]KUMAR A,SACHDEVA N.Multimodal Cyberbullying Detection Using Capsule Network with Dynamic Routing and Deep Convolutional Neural Network[J].Multimedia Systems,2022,28:2043-2052. [21]CHEN Y,ZHENG R,ZHOU A,et al.Automatic detection ofpornographic and gambling websites based on visual and textual content using a decision mechanism[J].Sensors,2020,20:3989. [22]GAW N,YOUSEFI S,GAHROOEI M R.Multimodal data fusion for systems improvement:A review[J].IISE Transactions,2022,54:1098-1116. [23]ZHOU S,RUAN L,XUQ,et al.Multimodal fraudulent website identification method based on heterogeneous model ensemble[J].China Communications,2023,20(5):263-274. [24]GALLO I,CALEFATI A,NAWAZ S,et al.Image and encoded text fusion for multi-modal classification[C]//Proceedings of the 2018 IEEE Digital Image Computing:Techniques and Applications(DICTA).2018:1-7. [25]WANG C,XUE P,ZHANG M,et al.Identifying GamblingWebsites with Co-training[C]//Proceedings of the Internatio-nal Conference on Software Engineering and Knowledge Enginee-ring.2022:1-10. [26]WANG C,ZHANG M,SHI F,et al.A hybrid multimodal data fusion-based method for identifying gambling websites[J].Electronics,2022,11(16):2489. [27]JOULIN A,GRAVE E,BOJANOWSKI P,et al.Bag of Tricks for Efficient Text Classification[C]//Proceedings of the Confe-rence of the European Chapter of the Association for Computational Linguistics.2016:7-12. [28]ZHOU S,RUAN L,XU Q,et al.Multimodal Fraudulent Website Identification Method Based on Heterogeneous Model Ensemble[J].China Communications,2023,20(5):263-274. [29]MIKOLOV T,CHEN K,CORRADO G,et al.Efficient Estimation of Word Representations in Vector Space[J].arXiv:1301.3781.2013. [30]PENNINGTON J,SOCHER R,MANNING C D.Glove:Global vectors for word representation[C]//Proceedings of the 2014 Conference on Empirical Methods in Natural Language Proces-sing(EMNLP).2014:1532-1543. [31]DEVLIN J,CHANG M W,LEE K,et al.Bert:Pre-training of deep bidirectional transformers for language understanding[J].arXiv:1810.04805,2018. [32]CHO K,VAN MERRIËNBOER B,GULCEHRE C,et al.Learning phrase representations using RNN encoder-decoder for statistical machine translation[J].arXiv:1406.1078,2014. [33]WAGAN A.A,LI Q,ZALAND Z,et al.A Unified Learning Approach for Malicious Domain Name Detection[J].Axioms,2023,12(5):458. [34]PARFENOVA A,CLAUSEL M.Risk prediction of pathological gambling on social media[J].arXiv:2403.19358,2024. [35]HE K,ZHANG X,REN S,et al.Deep Residual Learning forImage Recognition[C]//Proceedings of the 2016 IEEE Confe-rence on Computer Vision and Pattern Recognition(CVPR).2016:770-778. |
| [1] | LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87. |
| [2] | QIAN Qing, CHEN Huicheng, CUI Yunhe, TANG Ruixue, FU Jinmei. Joint Entity and Relation Extraction Method with Multi-scale Collaborative Aggregation and Axial-semantic Guidance [J]. Computer Science, 2026, 53(3): 97-106. |
| [3] | GE Zeqing, HUANG Shengjun. Semi-supervised Learning Method for Multi-label Tabular Data [J]. Computer Science, 2026, 53(3): 151-157. |
| [4] | WANG Xinyu, GAO Donghuai, NING Yuwen, XU Hao, QI Haonan. Student Behavior Detection Method Based on Improved YOLO Algorithm [J]. Computer Science, 2026, 53(3): 246-256. |
| [5] | FU Yukai, LI Qingzhen, DONG Zhixue, SHI Dongli, ZHAO Peng. Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning [J]. Computer Science, 2026, 53(3): 287-294. |
| [6] | YU Ding, LI Zhangwei. Prediction Method of RNA Secondary Structure Based on Transformer Architecture [J]. Computer Science, 2026, 53(3): 375-382. |
| [7] | DU Jiantong, GUAN Zeli, XUE Zhe. Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling [J]. Computer Science, 2026, 53(3): 383-391. |
| [8] | SU Ruitao, REN Jiongjiong, CHEN Shaozhen. Deep Learning-based Neural Differential Distinguishers for GIFT-128 and ASCON [J]. Computer Science, 2026, 53(3): 453-458. |
| [9] | XI Penghui, WU Xiazhen, JIANG Wencong, FANG Liangda, HE Chaobo, GUAN Quanlong. Review of Personalized Educational Resource Recommendations [J]. Computer Science, 2026, 53(2): 1-15. |
| [10] |
ZHUO Tienong, YING Di, ZHAO Hui.
Research on Student Classroom Concentration Integrating Cross-modal Attention and Role Interaction [J]. Computer Science, 2026, 53(2): 67-77. |
| [11] | XU Jingtao, YANG Yan, JIANG Yongquan. Time-Frequency Attention Based Model for Time Series Anomaly Detection [J]. Computer Science, 2026, 53(2): 161-169. |
| [12] | HUANG Jing, WANG Teng, LIU Jian, HU Kai, PENG Xin, HUANG Yamin, WEN Yuanqiao. Multimodal Visual Detection for Underwater Sonar Target Images [J]. Computer Science, 2026, 53(2): 227-235. |
| [13] | HAN Lei, SHANG Haoyu, QIAN Xiaoyan, GU Yan, LIU Qingsong, WANG Chuang. Constrained Multi-loss Video Anomaly Detection with Dual-branch Feature Fusion [J]. Computer Science, 2026, 53(2): 236-244. |
| [14] | GUO Xingxing, XIAO Yannan, WEN Peizhi, XU Zhi, HUANG Wenming. Attention-based Audio-driven Digital Face Video Generation Method [J]. Computer Science, 2026, 53(2): 245-252. |
| [15] | JI Sai, QIAO Liwei, SUN Yajie. Semantic-guided Hybrid Cross-feature Fusion Method for Infrared and Visible Light Images [J]. Computer Science, 2026, 53(2): 253-263. |
|
||