Sciweavers

551 search results - page 58 / 111
» Social spam detection
Sort
View
AAAI
1998
15 years 9 days ago
What Is Wrong With Us? Improving Robustness Through Social Diagnosis
1 Robust behavior in complex, dynamic environments mandates that intelligent agents autonomously monitor their own run-time behavior, detect and diagnose failures, and attempt reco...
Gal A. Kaminka, Milind Tambe
ICDE
2010
IEEE
209views Database» more  ICDE 2010»
15 years 4 months ago
Overlapping Community Search for social networks
— Finding decompositions of a graph into a family of clusters is crucial to understanding its underlying structure. While most existing approaches focus on partitioning the nodes...
Arnau Padrol-Sureda, Guillem Perarnau-Llobet, Juli...
VLDB
2005
ACM
177views Database» more  VLDB 2005»
15 years 4 months ago
Discovering Large Dense Subgraphs in Massive Graphs
We present a new algorithm for finding large, dense subgraphs in massive graphs. Our algorithm is based on a recursive application of fingerprinting via shingles, and is extreme...
David Gibson, Ravi Kumar, Andrew Tomkins
91
Voted
SDM
2010
SIAM
226views Data Mining» more  SDM 2010»
15 years 11 days ago
Two-View Transductive Support Vector Machines
Obtaining high-quality and up-to-date labeled data can be difficult in many real-world machine learning applications, especially for Internet classification tasks like review spam...
Guangxia Li, Steven C. H. Hoi, Kuiyu Chang
95
Voted
JCS
2010
135views more  JCS 2010»
14 years 9 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...