Sciweavers

44 search results - page 2 / 9
» Query-log mining for detecting spam
Sort
View
EDBT
2009
ACM
105views Database» more  EDBT 2009»
13 years 11 months ago
Personalizing entity detection and recommendation with a fusion of web log mining techniques
Given the proliferation of technology sites and the growing diversity of their readership, readers are more and more likely to encounter specialized language and terminology that ...
Kathleen Tsoukalas, Bin Zhou 0002, Jian Pei, Davor...
AIRWEB
2006
Springer
13 years 8 months ago
Improving Cloaking Detection using Search Query Popularity and Monetizability
Cloaking is a search engine spamming technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to users browsin...
Kumar Chellapilla, David Maxwell Chickering
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 6 months ago
A Spamicity Approach to Web Spam Detection
Web spam, which refers to any deliberate actions bringing to selected web pages an unjustifiable favorable relevance or importance, is one of the major obstacles for high quality ...
Bin Zhou 0002, Jian Pei, ZhaoHui Tang
CORR
2004
Springer
122views Education» more  CORR 2004»
13 years 4 months ago
"In vivo" spam filtering: A challenge problem for data mining
Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email communication. Many data mining researchers have addressed the problem of detecting spam, generally by...
Tom Fawcett
CEAS
2008
Springer
13 years 6 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...