2014
DOI: 10.1007/s13278-014-0189-1
|View full text |Cite
|
Sign up to set email alerts
|

SPADE: a social-spam analytics and detection framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…To cover deceptive information sharing, two more categories (i. people who lie for representing a good social image and ii. people who lie for malicious intentions) could be added to three categories of information sharing mentioned in [87]: privacy fundamentalist (unwilling to share), pragmatic majority (willing to share with privacy control), and marginally concerned (willing to share). Then it would be good if these five groups of people could be linked to behavioral models.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To cover deceptive information sharing, two more categories (i. people who lie for representing a good social image and ii. people who lie for malicious intentions) could be added to three categories of information sharing mentioned in [87]: privacy fundamentalist (unwilling to share), pragmatic majority (willing to share with privacy control), and marginally concerned (willing to share). Then it would be good if these five groups of people could be linked to behavioral models.…”
Section: Discussionmentioning
confidence: 99%
“…Even though there are some analysis tools and filtering techniques, most of the time it is not enough to prevent such spams. Thus, it is crucial to find the spam messages and spammers by creating features such as shown in Tables 2-3 and using machine learning techniques [78,87]. Creating honeypots and fake accounts may also be used to attract the spammers and then to find the creators of these accounts (spammers) [78,91].…”
Section: User Categorizationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this regard, there are only a few web spam corpora publicly available that can be successfully used to train, test, compare and rank existing and novel approaches for effective web spam detection and filtering. Moreover, most of the available alternatives are outdated and distributed in different incompatible formats [ 8 , 9 , 11 , 18 , 19 , 23 , 26 , 28 , 29 , 30 , 31 , 32 ]. This situation forces research teams to always carry out a previous compulsory task of data preparation and preprocessing [ 29 ], which in web spam-filtering domain habitually becomes hard, costly, time consuming and prone to error.…”
Section: Introductionmentioning
confidence: 99%
“…It implements algorithms for regression, classification, clustering, association rule mining and attribute selection. With all these features, Weka is widely used in business (Hailemariam et al 2012), research (Zhu et al 2014;Fire et al 2014;Wang et al 2014) and education (Markov and Russell 2006).…”
Section: Introductionmentioning
confidence: 99%