Sciweavers

7 search results - page 1 / 2
» FauxCrypt - A Method of Text Obfuscation
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 1 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
LREC
2008
93views Education» more  LREC 2008»
13 years 6 months ago
Using a Probabilistic Model of Context to Detect Word Obfuscation
This paper proposes a distributional model of word use and word meaning which is derived purely from a body of text, and then applies this model to determine whether certain words...
Sanaz Jabbari, Ben Allison, Louise Guthrie
ECRIME
2007
13 years 8 months ago
Fighting unicode-obfuscated spam
In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typi...
Changwei Liu, Sid Stamm
WWW
2009
ACM
14 years 5 months ago
Detecting image spam using local invariant features and pyramid match kernel
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, we extract local invariant features ...
Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, Guan...
KCAP
2005
ACM
13 years 10 months ago
Collecting paraphrase corpora from volunteer contributors
Extensive and deep paraphrase corpora are important for a variety of natural language processing and user interaction tasks. In this paper, we present an approach which i) collect...
Timothy Chklovski