2012
DOI: 10.1007/978-3-642-35386-4_33
|View full text |Cite
|
Sign up to set email alerts
|

Spam Fighting in Social Tagging Systems

Abstract: Abstract. Tagging in online social networks is very popular these days, as it facilitates search and retrieval of diverse resources available online. However, noisy and spam annotations often make it difficult to perform an efficient search. Users may make mistakes in tagging and irrelevant tags and resources may be maliciously added for advertisement or self-promotion. Since filtering spam annotations and spammers is time-consuming if it is done manually, machine learning approaches can be employed to facilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 12 publications
(14 reference statements)
0
4
0
Order By: Relevance
“…To filter out non-legitimate users, various anti-spamming techniques have been developed by numerous researchers in the field, employing either a form of Bayesian type filtering (Yazdani et al, 2012), or other tag classification methods . Particular characteristics of the tags used in annotations are exhibited, such as the presence of suspicious ones into user profiles.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…To filter out non-legitimate users, various anti-spamming techniques have been developed by numerous researchers in the field, employing either a form of Bayesian type filtering (Yazdani et al, 2012), or other tag classification methods . Particular characteristics of the tags used in annotations are exhibited, such as the presence of suspicious ones into user profiles.…”
Section: Related Workmentioning
confidence: 99%
“…In the above works the assumption made is that, any tags used by a legitimate user would coincide with those by other legitimate users. Nevertheless, if attackers are aware of the correlations being used in an attack filtering policy, they might try to disguise their fake profiles by using non-suspicious tags Yazdani et al, 2012). In such a case, any spam tag filtering is turned ineffective.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Spammers usually use different techniques for polluting the folksonomy. Examples include, by creating many accounts, publishing a specific post many times, using semantically diverse tags to annotate a resource and teaming up with other spammers to give good rating to each other (Yazdani et al ., 2012).…”
Section: Folksonomy Cleaningmentioning
confidence: 99%