Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval 2009
DOI: 10.1145/1571941.1572047
|View full text |Cite
|
Sign up to set email alerts
|

Detecting spammers and content promoters in online video social networks

Abstract: A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These features open opportunities for users to introduce polluted content, or simply pollution, into the system. For instance, spammers may post an unrelated video as response to a popular one aiming at increasing the likelihood of the response being viewed by a larger number of users. Moreover, opportunistic users -promoters -may try to gai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
39
0
3

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(47 citation statements)
references
References 24 publications
1
39
0
3
Order By: Relevance
“…In addition, since spam and attacks are so rampant in online social networking sites, Koutrika et al [30] propose techniques to detect tag spam in tagging systems. Benevenuto et al [24,23] utilize machine learning techniques to identify video spammers in video social networks. Gao et al [27] present a study on detecting and characterizing social spam campaigns in Facebook.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, since spam and attacks are so rampant in online social networking sites, Koutrika et al [30] propose techniques to detect tag spam in tagging systems. Benevenuto et al [24,23] utilize machine learning techniques to identify video spammers in video social networks. Gao et al [27] present a study on detecting and characterizing social spam campaigns in Facebook.…”
Section: Related Workmentioning
confidence: 99%
“…opinion spam) is a relatively recent research trend, so the literature is still relatively limited, but some studies show promising results. Studies include Benevenuto et al (2009) [1], Lim et al (2010) [15], Gilbert & Karrie (2010) [7], Wu et al [25,24], Ott et al (2011) [19], and Duan & Liu (2012) [5].…”
Section: Threat Analysis and Proposed Solutionsmentioning
confidence: 99%
“…In centralized trust systems, users' trust models are maintained by one central authority, i.e., manager, while in distributed trust systems each user maintains his/her own trust manager based on the previous interactions with other users. Distributed trust models are mainly used in P2P networks [15], while social networks usually use centralized systems (e.g., [18], [27], [24], and [30]). …”
Section: User Trust Modelingmentioning
confidence: 99%
“…Benevenuto et al [27] proposed various features for detecting spammers and promoters in the user feedback of YouTube videos. Spammers were defined as users who post an unrelated video as response to a popular one (e.g., pornographic content posted as response to a cartoon video), aiming at increasing the likelihood of the response being viewed by a larger number of users.…”
Section: User Trust Modelingmentioning
confidence: 99%
See 1 more Smart Citation