-
1
-
-
84916913164
-
-
[Online]. Available
-
(2014). [Online]. Available: http://en.wikipedia.org/wiki/cohen's-kappa
-
(2014)
-
-
-
2
-
-
84916913163
-
-
[Online]. Available
-
(2014). [Online]. Available: http://en.wikipedia.org/wiki/information-retrieval
-
(2014)
-
-
-
3
-
-
84916913162
-
-
[Online]. Available
-
(2012). [Online]. Available: https://developer.apple.com/news/index.php?id=02062012a
-
(2012)
-
-
-
4
-
-
84916913161
-
-
[Online]. Available
-
(2012). [Online]. Available: http://venturebeat.com/2012/07/03/apples-crackdown-on-app-ranking-manipulation/
-
(2012)
-
-
-
5
-
-
84916913160
-
-
[Online]. Available
-
(2012). [Online]. Available: http://www.ibtimes.com/apple-threatens-crackdown-biggest-app-store-ranking-fra ud-406764
-
(2012)
-
-
-
6
-
-
84916913159
-
-
[Online]. Available
-
(2012). [Online]. Available: http://www.lextek.com/manuals/onix/index.html
-
(2012)
-
-
-
7
-
-
84916913158
-
-
[Online]. Available
-
(2012). [Online]. Available: http://www.ling.gu.se/lager/mogul/porter-stemmer.
-
(2012)
-
-
-
8
-
-
1542287452
-
Investigating the relationship between language model perplexity and ir precision-recall measures
-
L. Azzopardi, M. Girolami, and K. V. Risjbergen, "Investigating the relationship between language model perplexity and ir precision-recall measures," in Proc. 26th Int. Conf. Res. Develop. Inform. Retrieval, 2003, pp. 369-370.
-
Proc. 26th Int. Conf. Res. Develop. Inform. Retrieval, 2003
, pp. 369-370
-
-
Azzopardi, L.1
Girolami, M.2
Risjbergen, K.V.3
-
9
-
-
0141607824
-
Latent Dirichlet allocation
-
D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent Dirichlet allocation," J. Mach. Learn. Res., pp. 993-1022, 2003.
-
(2003)
J. Mach. Learn. Res.
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
10
-
-
84863127286
-
A taxi driving fraud detection system
-
Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou, "A taxi driving fraud detection system," in Proc. IEEE 11th Int. Conf. Data Mining, 2011, pp. 181-190.
-
Proc. IEEE 11th Int. Conf. Data Mining, 2011
, pp. 181-190
-
-
Ge, Y.1
Xiong, H.2
Liu, C.3
Zhou, Z.-H.4
-
13
-
-
50249144225
-
-
Univ. Leipzig, Leipzig, Germany, Tech. Rep.
-
G. Heinrich, Parameter estimation for text analysis, " Univ. Leipzig, Leipzig, Germany, Tech. Rep., http://faculty.cs.byu.edu/~ringger/CS601R/papers/Heinrich-GibbsLDA.pdf, 2008.
-
(2008)
Parameter Estimation for Text Analysis
-
-
Heinrich, G.1
-
16
-
-
38049129511
-
An unsupervised learning algorithm for rank aggregation
-
A. Klementiev, D. Roth, and K. Small, "An unsupervised learning algorithm for rank aggregation," in Proc. 18th Eur. Conf. Mach. Learn., 2007, pp. 616-623.
-
Proc. 18th Eur. Conf. Mach. Learn., 2007
, pp. 616-623
-
-
Klementiev, A.1
Roth, D.2
Small, K.3
-
17
-
-
56449096414
-
Unsupervised rank aggregation with distance-based models
-
A. Klementiev, D. Roth, and K. Small, "Unsupervised rank aggregation with distance-based models," in Proc. 25th Int. Conf. Mach. Learn., 2008, pp. 472-479.
-
Proc. 25th Int. Conf. Mach. Learn., 2008
, pp. 472-479
-
-
Klementiev, A.1
Roth, D.2
Small, K.3
-
18
-
-
78751687284
-
Unsupervised rank aggregation with domain-specific expertise
-
A. Klementiev, D. Roth, K. Small, and I. Titov, "Unsupervised rank aggregation with domain-specific expertise," in Proc. 21st Int. Joint Conf. Artif. Intell., 2009, pp. 1101-1106.
-
Proc. 21st Int. Joint Conf. Artif. Intell., 2009
, pp. 1101-1106
-
-
Klementiev, A.1
Roth, D.2
Small, K.3
Titov, I.4
-
19
-
-
78651302642
-
Detecting product review spammers using rating behaviors
-
E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw, "Detecting product review spammers using rating behaviors," in Proc. 19thACMInt. Conf. Inform. Knowl. Manage., 2010, pp. 939-948.
-
Proc. 19thACMInt. Conf. Inform. Knowl. Manage., 2010
, pp. 939-948
-
-
Lim, E.-P.1
Nguyen, V.-A.2
Jindal, N.3
Liu, B.4
Lauw, H.W.5
-
20
-
-
35348860833
-
Supervised rank aggregation
-
Y.-T. Liu, T.-Y. Liu, T. Qin, Z.-M. Ma, and H. Li, "Supervised rank aggregation," in Proc. 16th Int. Conf. World Wide Web, 2007, pp. 481-490.
-
Proc. 16th Int. Conf. World Wide Web, 2007
, pp. 481-490
-
-
Liu, Y.-T.1
Liu, T.-Y.2
Qin, T.3
Ma, Z.-M.4
Li, H.5
-
21
-
-
85019796905
-
Spotting opinion spammers using behavioral footprints
-
A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh, "Spotting opinion spammers using behavioral footprints," in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 632-640.
-
Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013
, pp. 632-640
-
-
Mukherjee, A.1
Kumar, A.2
Liu, B.3
Wang, J.4
Hsu, M.5
Castellanos, M.6
Ghosh, R.7
-
22
-
-
34250653315
-
Detecting spam web pages through content analysis
-
A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly, "Detecting spam web pages through content analysis," in Proc. 15th Int. Conf. World Wide Web, 2006, pp. 83-92.
-
Proc. 15th Int. Conf. World Wide Web, 2006
, pp. 83-92
-
-
Ntoulas, A.1
Najork, M.2
Manasse, M.3
Fetterly, D.4
-
25
-
-
84873585431
-
Survey on web spam detection: Principles and algorithms
-
May
-
N. Spirin and J. Han, "Survey on web spam detection: Principles and algorithms," SIGKDD Explor. Newslett., vol. 13, no. 2, pp. 50-64, May 2012.
-
(2012)
SIGKDD Explor. Newslett.
, vol.13
, Issue.2
, pp. 50-64
-
-
Spirin, N.1
Han, J.2
-
27
-
-
84866039288
-
HySAD: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation
-
Z. Wu, J. Wu, J. Cao, and D. Tao, "HySAD: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation," in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 985-993.
-
Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012
, pp. 985-993
-
-
Wu, Z.1
Wu, J.2
Cao, J.3
Tao, D.4
-
28
-
-
84866022953
-
Review spam detection via temporal pattern discovery
-
S. Xie, G. Wang, S. Lin, and P. S. Yu, "Review spam detection via temporal pattern discovery," in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 823-831.
-
Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012
, pp. 823-831
-
-
Xie, S.1
Wang, G.2
Lin, S.3
Yu, P.S.4
-
29
-
-
79961035462
-
AppJoy: Personalized mobile application discovery
-
B. Yan and G. Chen, "AppJoy: Personalized mobile application discovery," in Proc. 9th Int. Conf. Mobile Syst., Appl., Serv., 2011, pp. 113-126.
-
Proc. 9th Int. Conf. Mobile Syst., Appl., Serv., 2011
, pp. 113-126
-
-
Yan, B.1
Chen, G.2
-
30
-
-
52649169775
-
A spamicity approach to web spam detection
-
B. Zhou, J. Pei, and Z. Tang, "A spamicity approach to web spam detection," in Proc. SIAM Int. Conf. Data Mining, 2008, pp. 277-288.
-
Proc. SIAM Int. Conf. Data Mining, 2008
, pp. 277-288
-
-
Zhou, B.1
Pei, J.2
Tang, Z.3
-
31
-
-
84871073974
-
Exploiting enriched contextual information for mobile app classification
-
H. Zhu, H. Cao, E. Chen, H. Xiong, and J. Tian, "Exploiting enriched contextual information for mobile app classification," in Proc. 21st ACMInt. Conf. Inform. Knowl. Manage., 2012, pp. 1617-1621.
-
Proc. 21st ACMInt. Conf. Inform. Knowl. Manage., 2012
, pp. 1617-1621
-
-
Zhu, H.1
Cao, H.2
Chen, E.3
Xiong, H.4
Tian, J.5
-
32
-
-
84874030599
-
Mining personal context-aware preferences for mobile users
-
H. Zhu, E. Chen, K. Yu, H. Cao, H. Xiong, and J. Tian, "Mining personal context-aware preferences for mobile users," in Proc. IEEE 12th Int. Conf. Data Mining, 2012, pp. 1212-1217.
-
Proc. IEEE 12th Int. Conf. Data Mining, 2012
, pp. 1212-1217
-
-
Zhu, H.1
Chen, E.2
Yu, K.3
Cao, H.4
Xiong, H.5
Tian, J.6
-
33
-
-
84889587593
-
Ranking fraud detection for mobile apps: A holistic view
-
H. Zhu, H. Xiong, Y. Ge, and E. Chen, "Ranking fraud detection for mobile apps: A holistic view," in Proc. 22nd ACM Int. Conf. Inform. Knowl. Manage., 2013, pp. 619-628.
-
Proc. 22nd ACM Int. Conf. Inform. Knowl. Manage., 2013
, pp. 619-628
-
-
Zhu, H.1
Xiong, H.2
Ge, Y.3
Chen, E.4
|