Sciweavers

192 search results - page 8 / 39
» Who gets spammed
Sort
View
JDFP
2006
98views more  JDFP 2006»
13 years 7 months ago
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories
We describe a new type of threat to the Internet infrastructure, in the shape of a highly efficient but very well camouflaged click-fraud attack on the advertising infrastructure....
Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz
ML
2010
ACM
138views Machine Learning» more  ML 2010»
13 years 2 months ago
Mining adversarial patterns via regularized loss minimization
Traditional classification methods assume that the training and the test data arise from the same underlying distribution. However, in several adversarial settings, the test set is...
Wei Liu, Sanjay Chawla
ICIW
2009
IEEE
13 years 5 months ago
Using Propagation of Distrust to Find Untrustworthy Web Neighborhoods
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. Bu...
Panagiotis Takis Metaxas
TREC
2007
13 years 8 months ago
Experiments in TREC 2007 Blog Opinion Task at CAS-ICT
This paper describes our participation in TREC 2007 Blog Track Tasks: Opinion retrieval and Polarity classification. As for Opinion retrieval task, a two-step approach is used to ...
Xiangwen Liao, Donglin Cao, Yu Wang 0009, Wei Liu,...
CSREAEEE
2008
128views Business» more  CSREAEEE 2008»
13 years 9 months ago
Public relations System for Mobile Learning
- In this paper, we proposed an automatic pushing system, whereby the users of mobile devices set their preferences on the Internet and receive `pushed' contents, which are a ...
Chul-Woo Kim, Misook Lim, Young-Min Chin