Sciweavers

CEAS
2007
Springer
13 years 7 months ago
Learning Fast Classifiers for Image Spam
Recently, spammers have proliferated "image spam", emails which contain the text of the spam message in a human readable image instead of the message body, making detect...
Mark Dredze, Reuven Gevaryahu, Ari Elias-Bachrach
CEAS
2007
Springer
13 years 7 months ago
Online Active Learning Methods for Fast Label-Efficient Spam Filtering
Active learning methods seek to reduce the number of labeled examples needed to train an effective classifier, and have natural appeal in spam filtering applications where trustwo...
D. Sculley
CEAS
2007
Springer
13 years 7 months ago
Blog Spam: A Review
Blogs are becoming an increasingly popular target for spammers. The existence of multiple vectors for spam injection, the potential of reaching many eyeballs with a single spam, a...
Adam Thomason
CEAS
2007
Springer
13 years 9 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...
CEAS
2007
Springer
13 years 9 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
CEAS
2007
Springer
13 years 9 months ago
A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification
We propose a discriminative classifier learning approach to image modeling for spam image identification. We analyze a large number of images extracted from the SpamArchive spam c...
Byungki Byun, Chin-Hui Lee, Steve Webb, Calton Pu
CEAS
2007
Springer
13 years 9 months ago
Discovering Leadership Roles in Email Workgroups
Email is a key communication tool for collaborative workgroups. In this paper, we investigate how team leadership roles can be inferred from a collection of email messages exchang...
Vitor R. Carvalho, Wen Wu, William W. Cohen
CEAS
2007
Springer
13 years 9 months ago
Asymmetric Gradient Boosting with Application to Spam Filtering
In this paper, we propose a new asymmetric boosting method, Boosting with Different Costs. Traditional boosting methods assume the same cost for misclassified instances from di...
Jingrui He, Bo Thiesson
CEAS
2007
Springer
13 years 9 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
CEAS
2007
Springer
13 years 9 months ago
TV-ACTA: Embedding an Activity-Centered Interface for Task Management in Email
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...