2012
DOI: 10.1109/msp.2011.942345
|View full text |Cite
|
Sign up to set email alerts
|

In Tags We Trust: Trust modeling in social tagging of multimedia content

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
2
2
2

Relationship

3
3

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 22 publications
(39 reference statements)
0
15
0
Order By: Relevance
“…To each video sequence in the dataset, a semi-automatic segmentation and tracking algorithm was applied in order to obtain a binary mask 4 , identifying a foreground object of interest, which not only plays a certain role in the understanding of the situation under White female, wears scarf around her face, walks toward the camera surveillance, but also may contain potentially privacy sensitive information. Different privacy protection filters were then applied to the extracted foreground objects.…”
Section: Use Cases and Underlying Databasementioning
confidence: 99%
See 1 more Smart Citation
“…To each video sequence in the dataset, a semi-automatic segmentation and tracking algorithm was applied in order to obtain a binary mask 4 , identifying a foreground object of interest, which not only plays a certain role in the understanding of the situation under White female, wears scarf around her face, walks toward the camera surveillance, but also may contain potentially privacy sensitive information. Different privacy protection filters were then applied to the extracted foreground objects.…”
Section: Use Cases and Underlying Databasementioning
confidence: 99%
“…Such measures insured significantly more reliable results of the subjective tests, compared to a classical crowdsourcing scenario. Otherwise, we could use statistical analysis for determining the behavioral outliers as presented in [4]. Also, we used Facebook, instead of such tools like Amazon Mechanical Turk 3 , to avoid paying people, which could lead to situation when people maximize their profits at the expense of honest evaluation results.…”
Section: Introductionmentioning
confidence: 99%
“…Ivanov et al [8] surveyed recent advances in techniques for combatting noise and spam in social tagging systems, classified the state-of-the-art approaches into a few categories and qualitatively compared and contrasted them.…”
Section: Spam Fighting In Social Tagging Systemsmentioning
confidence: 99%
“…Trust modeling can be performed at each level separately (e.g., [25]), or different levels can be considered jointly to produce trust models, for example, to assess a user's reliability, one can consider not only the user profile but also the content that the user uploaded to a social network (e.g., [20]). Trust modeling approaches can be categorized into two classes according to the target of trust, that is, content and user trust modeling [12].…”
Section: Trust Modeling In Social Mediamentioning
confidence: 99%
“…An interesting point is that, for the time being, Liu et al collected the largest dataset for trust modeling by crawling Delicious [12]. This dataset had around 82,000 users, 1:1 million tags, 9:3 million bookmarks, and 17:4 million tagbookmark associations.…”
Section: A Wisdom Of Crowds Modelmentioning
confidence: 99%