Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable f...
We introduce a method for image retrieval that leverages the implicit information about object importance conveyed by the list of keyword tags a person supplies for an image. We p...
Abstract--The increasing popularity of social media is shortening the distance between people. Social activities, e.g., tagging in Flickr, bookmarking in Delicious, twittering in T...
In early 2007, the California State University (CSU) system initiated a program to make all information technology accessible to persons with disabilities; the authors were appoint...
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...