Sciweavers

1340 search results - page 65 / 268
» Spam Filter Analysis
Sort
View
125
Voted
DSN
2008
IEEE
15 years 11 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
CVPR
2010
IEEE
15 years 8 months ago
Harvesting Large-Scale Weakly-Tagged Image Databases from the Web
To leverage large-scale weakly-tagged images for computer vision tasks (such as object detection and scene recognition), a novel cross-modal tag cleansing and junk image filtering...
Jianping Fan
139
Voted
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 6 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
157
Voted
SPIRE
2010
Springer
15 years 3 months ago
Fingerprinting Ratings for Collaborative Filtering - Theoretical and Empirical Analysis
Abstract. We consider fingerprinting methods for collaborative filtering (CF) systems. In general, CF systems show their real strength when supplied with enormous data sets. Earl...
Yoram Bachrach, Ralf Herbrich
ICASSP
2011
IEEE
14 years 8 months ago
Anti-aliasing filter for subpixel down-sampling based on frequency analysis
Nowadays, digital pictures are usually captured at very high resolution ranged up to 12 mega-pixels. Limited by low-resolution display, we have to shrink the image. Signal process...
Lu Fang, Ketan Tang, Oscar C. Au, Aggelos K. Katsa...