Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
In this paper, we study the overall link-based spam structure and its evolution which would be helpful for the development of robust analysis tools and research for Web spamming a...