Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web 2007
DOI: 10.1145/1244408.1244420
|View full text |Cite
|
Sign up to set email alerts
|

Combating spam in tagging systems

Abstract: Tagging systems allow users to interactively annotate a pool of shared resources using descriptive strings, which are called tags. Tags are used to guide users to interesting resources and help them build communities that share their expertise and resources. As tagging systems are gaining in popularity, they become more susceptible to tag spam: misleading tags that are generated in order to increase the visibility of some resources or simply to confuse users. Our goal is to understand this problem better. In p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
97
0
4

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 111 publications
(103 citation statements)
references
References 11 publications
0
97
0
4
Order By: Relevance
“…Cha et al [25] design diverse metrics to measure Twitter accounts. In addition, since spam and attacks are so rampant in online social networking sites, Koutrika et al [30] propose techniques to detect tag spam in tagging systems. Benevenuto et al [24,23] utilize machine learning techniques to identify video spammers in video social networks.…”
Section: Related Workmentioning
confidence: 99%
“…Cha et al [25] design diverse metrics to measure Twitter accounts. In addition, since spam and attacks are so rampant in online social networking sites, Koutrika et al [30] propose techniques to detect tag spam in tagging systems. Benevenuto et al [24,23] utilize machine learning techniques to identify video spammers in video social networks.…”
Section: Related Workmentioning
confidence: 99%
“…Koutrika et al [12] were the first to explicitly discuss methods of tackling spamming activities in social tagging systems. The authors studied the impact of spamming through a framework for modeling social tagging systems and user tagging behavior.…”
Section: Tag Characteristics and Spam Impact In Taggingmentioning
confidence: 99%
“…First, spammers can use legitimate resources and assign irrelevant tags to them for the purpose of advertisement or self-promotion [3]. Second, spammers can use popular and high ranking tags to describe a spam resource and boost its rank [12]. Therefore, one of the most important issues in social tagging systems is to identify appropriate tags and at the same time filter or eliminate spam content or spammers.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, researchers have started to realize the importance of social bookmarking. This leads to the exploration of tagging logs in different ways [5,10,4,8,7,15]. Most work are focusing on utilizing social tags, instead of suggesting tags.…”
Section: Related Workmentioning
confidence: 99%
“…Most work are focusing on utilizing social tags, instead of suggesting tags. Folksonomy [10], tagging visualization [4], and spam detection for tagging system [8] are some of such examples. [2] utilizes social tags to help summarization.…”
Section: Related Workmentioning
confidence: 99%