Sciweavers

968 search results - page 92 / 194
» Adaptive Filtering of SPAM
Sort
View
124
Voted
KDD
2009
ACM
170views Data Mining» more  KDD 2009»
16 years 3 months ago
Genre-based decomposition of email class noise
Corruption of data by class-label noise is an important practical concern impacting many classification problems. Studies of data cleaning techniques often assume a uniform label ...
Aleksander Kolcz, Gordon V. Cormack
104
Voted
DSN
2008
IEEE
15 years 9 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
CVPR
2010
IEEE
15 years 6 months ago
Harvesting Large-Scale Weakly-Tagged Image Databases from the Web
To leverage large-scale weakly-tagged images for computer vision tasks (such as object detection and scene recognition), a novel cross-modal tag cleansing and junk image filtering...
Jianping Fan
120
Voted
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 4 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
141
Voted
CCS
2006
ACM
15 years 4 months ago
Dynamic rule-ordering optimization for high-speed firewall filtering
Packet filtering plays a critical role in many of the current high speed network technologies such as firewalls and IPSec devices. The optimization of firewall policies is critica...
Hazem Hamed, Ehab Al-Shaer