-
3
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
ACM
-
F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonçalves. Detecting spammers and content promoters in online video social networks. In SIGIR, pages 620-627. ACM, 2009.
-
(2009)
SIGIR
, pp. 620-627
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Gonçalves, M.5
-
4
-
-
84858057688
-
Using language modeling for spam detection in social reference manager websites
-
Citeseer
-
T. Bogers and A. Van den Bosch. Using language modeling for spam detection in social reference manager websites. In DIR, pages 87-94. Citeseer, 2009.
-
(2009)
DIR
, pp. 87-94
-
-
Bogers, T.1
Van Den Bosch, A.2
-
5
-
-
74549140893
-
A co-classification framework for detecting web spam and spammers in social media web sites
-
ACM
-
F. Chen, P.N. Tan, and A.K. Jain. A co-classification framework for detecting web spam and spammers in social media web sites. In CIKM, pages 1807-1810. ACM, 2009.
-
(2009)
CIKM
, pp. 1807-1810
-
-
Chen, F.1
Tan, P.N.2
Jain, A.K.3
-
6
-
-
80053229463
-
An empirical study on learning to rank of tweets
-
Association for Computational Linguistics
-
Y. Duan, L. Jiang, T. Qin, M. Zhou, and H.Y. Shum. An empirical study on learning to rank of tweets. In COLING, pages 295-303. Association for Computational Linguistics, 2010.
-
(2010)
COLING
, pp. 295-303
-
-
Duan, Y.1
Jiang, L.2
Qin, T.3
Zhou, M.4
Shum, H.Y.5
-
7
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
ACM
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B.Y. Zhao. Detecting and characterizing social spam campaigns. In IMC, pages 35-47. ACM, 2010.
-
(2010)
IMC
, pp. 35-47
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
8
-
-
78650005374
-
Spam: The underground on 140 characters or less
-
ACM
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @ spam: the underground on 140 characters or less. In CCS, pages 27-37. ACM, 2010.
-
(2010)
CCS
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
9
-
-
77955746931
-
Method for countering social bookmarking pollution using user similarities
-
T. Hatanaka and H. Hisamatsu. Method for countering social bookmarking pollution using user similarities. Networked Digital Technologies, pages 523-528, 2010.
-
(2010)
Networked Digital Technologies
, pp. 523-528
-
-
Hatanaka, T.1
Hisamatsu, H.2
-
10
-
-
36348956237
-
Fighting spam on social web sites: A survey of approaches and future challenges
-
P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting spam on social web sites: A survey of approaches and future challenges. Internet Computing, IEEE, 11(6):36-45, 2007.
-
(2007)
Internet Computing, IEEE
, vol.11
, Issue.6
, pp. 36-45
-
-
Heymann, P.1
Koutrika, G.2
Garcia-Molina, H.3
-
11
-
-
70849091579
-
Ranking comments on the social web
-
IEEE
-
C.F. Hsu, E. Khabiri, and J. Caverlee. Ranking comments on the social web. In CSE, volume 4, pages 90-97. IEEE, 2009.
-
(2009)
CSE
, vol.4
, pp. 90-97
-
-
Hsu, C.F.1
Khabiri, E.2
Caverlee, J.3
-
12
-
-
84904822464
-
Study of trend-stuffing on twitter through text classification
-
D. Irani, S. Webb, C. Pu, and K. Li. Study of trend-stuffing on twitter through text classification. In CEAS, 2010.
-
(2010)
CEAS
-
-
Irani, D.1
Webb, S.2
Pu, C.3
Li, K.4
-
13
-
-
84863768271
-
Socialspamguard: A data mining-based spam detection system for social media networks
-
X. Jin, C.X. Lin, J. Luo, and J. Han. Socialspamguard: A data mining-based spam detection system for social media networks. PVLDB, pages 1458-1461, 2011.
-
(2011)
PVLDB
, pp. 1458-1461
-
-
Jin, X.1
Lin, C.X.2
Luo, J.3
Han, J.4
-
14
-
-
77954631100
-
The utility of tweeted URLS for web search
-
ACM
-
V. Kandylas and A. Dasdan. The utility of tweeted urls for web search. In WWW, pages 1127-1128. ACM, 2010.
-
(2010)
WWW
, pp. 1127-1128
-
-
Kandylas, V.1
Dasdan, A.2
-
15
-
-
63049101066
-
The antisocial tagger: Detecting spam in social bookmarking systems
-
ACM
-
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. The antisocial tagger: detecting spam in social bookmarking systems. In AIRWeb, pages 61-68. ACM, 2008.
-
(2008)
AIRWeb
, pp. 61-68
-
-
Krause, B.1
Schmitz, C.2
Hotho, A.3
Stumme, G.4
-
16
-
-
83055187614
-
Content-driven detection of campaigns in social media
-
ACM
-
K. Lee, J. Caverlee, Z. Cheng, and D.Z. Sui. Content-driven detection of campaigns in social media. In CIKM, pages 551- 556. ACM, 2011.
-
(2011)
CIKM
, pp. 551-556
-
-
Lee, K.1
Caverlee, J.2
Cheng, Z.3
Sui, D.Z.4
-
17
-
-
77956044597
-
Uncovering social spammers: Social honeypots+ machine learning
-
ACM
-
K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: social honeypots+ machine learning. In SIGIR, pages 435-442. ACM, 2010.
-
(2010)
SIGIR
, pp. 435-442
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
19
-
-
72449186612
-
Telling experts from spammers: Expertise ranking in folksonomies
-
ACM
-
M.G. Noll, C. Au Yeung, N. Gibbins, C. Meinel, and N. Shadbolt. Telling experts from spammers: expertise ranking in folksonomies. In SIGIR, pages 612-619. ACM, 2009.
-
(2009)
SIGIR
, pp. 612-619
-
-
Noll, M.G.1
Au Yeung, C.2
Gibbins, N.3
Meinel, C.4
Shadbolt, N.5
-
20
-
-
77950923058
-
Ranking mechanisms in twitter-like forums
-
ACM
-
A.D. Sarma, A.D. Sarma, S. Gollapudi, and R. Panigrahy. Ranking mechanisms in twitter-like forums. In WSDM, pages 21-30. ACM, 2010.
-
(2010)
WSDM
, pp. 21-30
-
-
Sarma, A.D.1
Sarma, A.D.2
Gollapudi, S.3
Panigrahy, R.4
-
21
-
-
24944537843
-
Large margin methods for structured and interdependent output variables
-
I. Tsochantaridis, T. Joachims, T. Hofmann, and Y. Altun. Large margin methods for structured and interdependent output variables. Journal of Machine Learning Research, 6(2):1453, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.6
, Issue.2
, pp. 1453
-
-
Tsochantaridis, I.1
Joachims, T.2
Hofmann, T.3
Altun, Y.4
-
22
-
-
83055179234
-
User oriented tweet ranking: A filtering approach to microblogs
-
ACM
-
I. Uysal and W.B. Croft. User oriented tweet ranking: a filtering approach to microblogs. In CIKM, pages 2261-2264. ACM, 2011.
-
(2011)
CIKM
, pp. 2261-2264
-
-
Uysal, I.1
Croft, W.B.2
-
23
-
-
78651420679
-
Don't follow me: Spam detection in twitter
-
IEEE
-
A.H. Wang. Don't follow me: Spam detection in twitter. In SECRYPT, pages 1-10. IEEE, 2010.
-
(2010)
SECRYPT
, pp. 1-10
-
-
Wang, A.H.1
-
24
-
-
80053654994
-
A social-spam detection framework
-
ACM
-
D. Wang, D. Irani, and C. Pu. A social-spam detection framework. In CEAS, pages 46-54. ACM, 2011.
-
(2011)
CEAS
, pp. 46-54
-
-
Wang, D.1
Irani, D.2
Pu, C.3
-
25
-
-
57149125154
-
CSV: Visualizing and mining cohesive subgraphs
-
ACM
-
N. Wang, S. Parthasarathy, K.L. Tan, and A.K.H. Tung. Csv: visualizing and mining cohesive subgraphs. In SIGMOD, pages 445-458. ACM, 2008.
-
(2008)
SIGMOD
, pp. 445-458
-
-
Wang, N.1
Parthasarathy, S.2
Tan, K.L.3
Tung, A.K.H.4
-
26
-
-
78751514668
-
Turank: Twitter user ranking based on user-tweet graph analysis
-
Springer
-
Y. Yamaguchi, T. Takahashi, T. Amagasa, and H. Kitagawa. Turank: Twitter user ranking based on user-tweet graph analysis. In WISE, pages 240-253. Springer, 2010.
-
(2010)
WISE
, pp. 240-253
-
-
Yamaguchi, Y.1
Takahashi, T.2
Amagasa, T.3
Kitagawa, H.4
|