Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web 2009
DOI: 10.1145/1531914.1531924
|View full text |Cite
|
Sign up to set email alerts
|

Social spam detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
95
0
2

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 150 publications
(97 citation statements)
references
References 15 publications
0
95
0
2
Order By: Relevance
“…LibSVM and rotation forest classifiers have slightly lower accuracy of 0.986 and 0.981, with 0.014 and 0.019 of FPR, respectively. As noted by Markines et al [14], in a deployed social spam detection system it is more important that FPR is kept low compared to high accuracy, because misclassification of a legitimate user is a more consequential mistake than missing a spammer. Other researchers, who proposed different features from the whole or partial dataset of ECML PKDD Discovery Challenge 2008, obtained similar results, for example, Markines et al [14] were able to reach 0.979 of accuracy and 0.013 of FPR, while Bogers et al [3] got 0.9799 of classification accuracy.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…LibSVM and rotation forest classifiers have slightly lower accuracy of 0.986 and 0.981, with 0.014 and 0.019 of FPR, respectively. As noted by Markines et al [14], in a deployed social spam detection system it is more important that FPR is kept low compared to high accuracy, because misclassification of a legitimate user is a more consequential mistake than missing a spammer. Other researchers, who proposed different features from the whole or partial dataset of ECML PKDD Discovery Challenge 2008, obtained similar results, for example, Markines et al [14] were able to reach 0.979 of accuracy and 0.013 of FPR, while Bogers et al [3] got 0.9799 of classification accuracy.…”
Section: Discussionmentioning
confidence: 99%
“…Markines et al [14] proposed six different tag-, content-and user-based features for automatic detection of spammers in BibSonomy. The authors used features representing the probability of a tag being spam, number of advertises per post and number of valid resources per user posts.…”
Section: Spam Fighting In Social Tagging Systemsmentioning
confidence: 99%
“…The honey profiles are normal user profiles created to passively trap spammers by tracking down their malicious activities towards the profiles. Markines et al (2009) explored the six features of social spam appeared on social tagging system, including TagSpam, TagBlur, DomFp, NumAds, Plagiarism, and Validlinks. The six explored features can be well fitted in various machine learning algorithms for classification.…”
Section: Malicious Actor Detecting Mechanisms For Communitiesmentioning
confidence: 99%
“…In a social tagging system, spam or noise can be injected at three different levels: spam content, spam tag-content association, and spammer [18]. Trust modeling can be performed at each level separately (e.g., [18]) or different levels can be considered jointly to produce trust models, for example, to assess a user's reliability, one can consider not only the user profile, but also the content that the user uploaded to a social system (e.g., [19]).…”
Section: Trust Modelingmentioning
confidence: 99%
“…Trust modeling can be performed at each level separately (e.g., [18]) or different levels can be considered jointly to produce trust models, for example, to assess a user's reliability, one can consider not only the user profile, but also the content that the user uploaded to a social system (e.g., [19]). In this article, we categorize trust modeling approaches into two classes according to the target of trust, i.e., user and content trust modeling (shown in Figure 3).…”
Section: Trust Modelingmentioning
confidence: 99%