Sciweavers

551 search results - page 56 / 111
» Social spam detection
Sort
View
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 4 months ago
Exploring the design space of social network-based Sybil defenses
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
Bimal Viswanath, Mainack Mondal, Allen Clement, Pe...
CIKM
2003
Springer
14 years 2 months ago
The link prediction problem for social networks
Given a snapshot of a social network, can we infer which new interactions among its members are likely to occur in the near future? We formalize this question as the link predicti...
David Liben-Nowell, Jon M. Kleinberg
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
13 years 6 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
KDD
2009
ACM
170views Data Mining» more  KDD 2009»
14 years 9 months ago
Genre-based decomposition of email class noise
Corruption of data by class-label noise is an important practical concern impacting many classification problems. Studies of data cleaning techniques often assume a uniform label ...
Aleksander Kolcz, Gordon V. Cormack
DIMVA
2009
13 years 10 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...