Detecting child sexual abuse material: A comprehensive survey

HE Lee, T Ermakova, V Ververis, B Fabian - Forensic Science International …, 2020 - Elsevier
Victims of child sexual abuse suffer from physical, psychological, and emotional trauma. The
detection and deletion of illicit online child sexual abuse material (CSAM) helps in reducing …

A systematic review of computer science solutions for addressing violence against women and children

DA Rodríguez, A Díaz-Ramírez… - IEEE …, 2021 - ieeexplore.ieee.org
Violence against women and children is a public health issue of pandemic proportions. It is
estimated that one in every three women worldwide has experienced physical, emotional, or …

Classifying illegal activities on tor network based on web textual contents

MW Al Nabki, E Fidalgo, E Alegre… - Proceedings of the 15th …, 2017 - aclanthology.org
The freedom of the Deep Web offers a safe place where people can express themselves
anonymously but they also can conduct illegal activities. In this paper, we present and make …

Leveraging deep neural networks to fight child pornography in the age of social media

P Vitorino, S Avila, M Perez, A Rocha - Journal of Visual Communication …, 2018 - Elsevier
Over the past two decades, the nature of child pornography in terms of generation,
distribution and possession of images drastically changed, evolving from basically covert …

Seeing without looking: Analysis pipeline for child sexual abuse datasets

C Laranjeira da Silva, J Macedo, S Avila… - Proceedings of the …, 2022 - dl.acm.org
The online sharing and viewing of Child Sexual Abuse Material (CSAM) are growing fast,
such that human experts can no longer handle the manual inspection. However, the …

A systematic survey of online data mining technology intended for law enforcement

M Edwards, A Rashid, P Rayson - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
As an increasing amount of crime takes on a digital aspect, law enforcement bodies must
tackle an online environment generating huge volumes of data. With manual inspections …

Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks

G Bissias, B Levine, M Liberatore, B Lynn, J Moore… - Child abuse & …, 2016 - Elsevier
We provide detailed measurement of the illegal trade in child exploitation material (CEM,
also known as child pornography) from mid-2011 through 2014 on five popular peer-to-peer …

[图书][B] Study on the gender dimension of trafficking in human beings

S Walby, B Apitzsch, JE Armstrong, S Balderston… - 2016 - openaccess.city.ac.uk
The purpose of this study is to contribute to the identification and understanding of what it
means to be 'taking into account the gender perspective, to strengthen the prevention of this …

Learning strategies for sensitive content detection

D Povedano Álvarez, AL Sandoval Orozco… - Electronics, 2023 - mdpi.com
Currently, the volume of sensitive content on the Internet, such as pornography and child
pornography, and the amount of time that people spend online (especially children) have …

[PDF][PDF] File Name Classification Approach to Identify Child Sexual Abuse.

MW Al Nabki, E Fidalgo, E Alegre, R Alaíz-Rodríguez - ICPRAM, 2020 - scitepress.org
When Law Enforcement Agencies seize a computer machine from a potential producer or
consumer of Child Sexual Exploitation Material (CSEM), they need accurate and time …