2008
DOI: 10.1145/1409220.1409225
|View full text |Cite
|
Sign up to set email alerts
|

Combating spam in tagging systems

Abstract: Tagging systems allow users to interactively annotate a pool of shared resources using descriptive strings, which are called tags. Tags are used to guide users to interesting resources and help them build communities that share their expertise and resources. As tagging systems are gaining in popularity, they become more susceptible to tag spam: misleading tags that are generated in order to increase the visibility of some resources or simply to confuse users. Our goal is to understand this problem better. In p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(39 citation statements)
references
References 13 publications
0
39
0
Order By: Relevance
“…Koutrika et al [60] assigned relevance numbers to web resources based on the number of common tags they share. This is a language-independent method.…”
Section: Protection Of Folksonomy Structurementioning
confidence: 99%
“…Koutrika et al [60] assigned relevance numbers to web resources based on the number of common tags they share. This is a language-independent method.…”
Section: Protection Of Folksonomy Structurementioning
confidence: 99%
“…Second, we filter out the tags and edges with frequency lower than certain threshold, since these unfrequent features do not have statistical meaning. In this experiment, we exclude the tags which were annotated by fewer than ten users, as these unpopular tags have little valuable information or noises [15]. After this pre-processing, more than ten thousand tags are left per month on average, and cover over 70% tagging actions.…”
Section: Dataset Preprocessingmentioning
confidence: 99%
“…This research indicates that some commonly used algorithms were vulnerable to attacks created by generating false clickstreams designed to promote particular target pages. Recently, Koutrika et al (2007) presented an analysis of tagging systems which found that these systems are also prone to manipulation by malicious agents.…”
Section: Related Workmentioning
confidence: 99%