DOI: 10.1007/978-3-540-70720-2_21
|View full text |Cite
|
Sign up to set email alerts
|

WebAngels Filter: A Violent Web Filtering Engine Using Textual and Structural Content-Based Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Comparing with MIL, we can find that our CMIL model makes differences in the following aspects: (1) Input bag not only contains instances' data and bag's label, but also contains a contextual graph that represents the contextual relationships among different instances in the same bag. (2) The underlying label of the instance in CMIL is a fuzzy label. (3) The label of the bag is not decided by instances' labels themselves, but depends on the contextual energy of each bag.…”
Section: B Formulation Of Cmilmentioning
confidence: 99%
See 1 more Smart Citation
“…Comparing with MIL, we can find that our CMIL model makes differences in the following aspects: (1) Input bag not only contains instances' data and bag's label, but also contains a contextual graph that represents the contextual relationships among different instances in the same bag. (2) The underlying label of the instance in CMIL is a fuzzy label. (3) The label of the bag is not decided by instances' labels themselves, but depends on the contextual energy of each bag.…”
Section: B Formulation Of Cmilmentioning
confidence: 99%
“…To protect our psychological health, lots of scientific researchers investigate into web filtering and try to filter out the objectionable contents automatically. Some pornographic or violent content filters, have matured to a point where robust recognition or filter software is available [1] [2]. In contrast, the research of affective semantics of horror images is still on the stage of exploration.…”
Section: Introductionmentioning
confidence: 98%
“…Most current approaches for detecting malicious contents are based on IP, text and content [1] - [3]. IPbased approaches use a blacklist of objectionable contents [1]. However, this blacklist can only represent a limited number of malicious websites at any given moment.…”
Section: Introductionmentioning
confidence: 99%
“…In order to prevent these malicious contents, many approaches have been studied. Most current approaches for detecting malicious contents are based on IP, text and content [1] - [3]. IPbased approaches use a blacklist of objectionable contents [1].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation