메뉴 건너뛰기




Volumn 4, Issue , 2009, Pages 429-435

SpamClean: Towards spam-free tagging systems

Author keywords

[No Author keywords available]

Indexed keywords

SEARCH MODELS; SEARCH RESULTS; TAG SPAM; TAGGING SYSTEMS;

EID: 70849088185     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.154     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 70849135951 scopus 로고    scopus 로고
    • "Flickr. http://www.flickr.com/.".
    • Flickr
  • 2
  • 3
    • 70849114373 scopus 로고    scopus 로고
    • "YouTube. http://www.youtube.com/.".
    • YouTube
  • 4
    • 36348956237 scopus 로고    scopus 로고
    • Fighting spam on social web sites: A survey of approaches and future challenges
    • P. Heymann, G. Koutrika, and H. Garcia-Molina, "Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges, " IEEE Internet Computing, vol. 11, no. 6, pp. 36-45, 2007.
    • (2007) IEEE Internet Computing , vol.11 , Issue.6 , pp. 36-45
    • Heymann, P.1    Koutrika, G.2    Garcia-Molina, H.3
  • 6
    • 70849106738 scopus 로고    scopus 로고
    • "Slidesharehttp://slideshare.net/.".
    • Slideshare
  • 7
    • 70849115504 scopus 로고    scopus 로고
    • "Rawsugar. http://rawsugar.com/".
    • Rawsugar
  • 8
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • J. R. Douceur, "The Sybil Attack, " in IPTPS, 2002.
    • (2002) IPTPS
    • Douceur, J.R.1
  • 9
    • 63049101066 scopus 로고    scopus 로고
    • The anti-social tagger: Detecting spam in social bookmarking systems
    • B. Krause, C. Schmitz, A. Hotho, and G. Stumme, "The anti-social tagger: detecting spam in social bookmarking systems, " in AIRWeb, 2008, pp. 61-68.
    • (2008) AIRWeb , pp. 61-68
    • Krause, B.1    Schmitz, C.2    Hotho, A.3    Stumme, G.4
  • 10
    • 70849133061 scopus 로고    scopus 로고
    • Combining clustering with classification for spam detection in social bookmarking systems
    • Z. Kyriakopoulou and T. Kalamboukis, "Combining Clustering with Classification for Spam Detection in Social Bookmarking Systems, " in RSDC, 2008.
    • (2008) RSDC
    • Kyriakopoulou, Z.1    Kalamboukis, T.2
  • 11
    • 70849084244 scopus 로고    scopus 로고
    • A novel supervised learning algorithm and its use for spam detection in social bookmarking systems
    • A. Gkanogiannis and T. Kalamboukis, "A novel supervised learning algorithm and its use for Spam Detection in Social Bookmarking Systems, " in RSDC, 2008.
    • (2008) RSDC
    • Gkanogiannis, A.1    Kalamboukis, T.2
  • 12
    • 70849094906 scopus 로고    scopus 로고
    • Using language models for spam detection in social bookmarking systems
    • T. Bogers and A. Bosch, "Using Language Models for Spam Detection in Social Bookmarking Systems, " in RSDC, 2008.
    • (2008) RSDC
    • Bogers, T.1    Bosch, A.2
  • 14
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard AI problems for security
    • L. vonAhn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: Using Hard AI Problems for Security, " in EUROCRYPT, 2003, pp. 294- 311.
    • (2003) EUROCRYPT , pp. 294-311
    • Von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4
  • 15
    • 64849115434 scopus 로고    scopus 로고
    • PINTS: Peer-to-peer infrastructure for tagging systems
    • O. Görlitz, S. Sizov, and S. Staab, "PINTS: Peer-to-Peer Infrastructure for Tagging Systems, " in IPTPS, 2008.
    • (2008) IPTPS
    • Görlitz, O.1    Sizov, S.2    Staab, S.3
  • 17
    • 35348868025 scopus 로고    scopus 로고
    • Towards effective browsing of large scale social annotations
    • R. Li, S. Bao, Y. Yu, B. Fei, and Z. Su, "Towards effective browsing of large scale social annotations, " in WWW, 2007, pp. 943-952.
    • (2007) WWW , pp. 943-952
    • Li, R.1    Bao, S.2    Yu, Y.3    Fei, B.4    Su, Z.5
  • 19
    • 0033726520 scopus 로고    scopus 로고
    • The small-world phenomenon: An algorithm perspective
    • J. M. Kleinberg, "The small-world phenomenon: an algorithm perspective, " in STOC, 2000.
    • (2000) STOC
    • Kleinberg, J.M.1
  • 20
    • 33750285481 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: defending against sybil attacks via social networks, " in SIGCOMM, 2006, pp. 267-278.
    • (2006) SIGCOMM , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 22
    • 85027289714 scopus 로고    scopus 로고
    • Computational puzzles as sybil defenses
    • N. Borisov, "Computational Puzzles as Sybil Defenses, " in Peer-to-Peer Computing, 2006, pp. 171-176.
    • (2006) Peer-to-Peer Computing , pp. 171-176
    • Borisov, N.1
  • 23
    • 34548349212 scopus 로고    scopus 로고
    • Limiting sybil attacks in structured P2P networks
    • H. Rowaihy, W. Enck, P. McDaniel, and T. L. Porta, "Limiting Sybil Attacks in Structured P2P Networks, " in INFOCOM, 2007, pp. 2596- 2600.
    • (2007) INFOCOM , pp. 2596-2600
    • Rowaihy, H.1    Enck, W.2    Mcdaniel, P.3    Porta, T.L.4
  • 24
    • 36949036429 scopus 로고    scopus 로고
    • Portcullis: Protecting connection setup from denial-of-capability attacks
    • B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. M. Maggs, and Y.-C. Hu, "Portcullis: protecting connection setup from denial-of-capability attacks, " in SIGCOMM, 2007, pp. 289-300.
    • (2007) SIGCOMM , pp. 289-300
    • Parno, B.1    Wendlandt, D.2    Shi, E.3    Perrig, A.4    Maggs, B.M.5    Hu, Y.-C.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.