Security and Trust in social media networks

Size: px
Start display at page:

Download "Security and Trust in social media networks"

Transcription

1 !1 Security and Trust in social media networks Prof. Touradj Ebrahimi DMP meeting San Jose, CA, USA 11 January 2014

2 Social media landscape!2

3 Popularity of social networks!3 March 2012 May

4 Popularity of social networks (cont.) 1+ billion photos 7+ billion photos ~140 billion photos 72 hours of video every minute April 2012

5 Popularity of social networks (cont.)!5 February

6 Popularity of social networks (cont.)!6 January

7 Trust & security issues in social networks!7

8 Trust & security issues in social networks (cont.)!8 Socialcam application automatically shares with your Facebook friends videos you watch May be doing you more harm than good!

9 Trust & security issues in social networks (cont.)!9 Spotify and Yahoo News Activity automatically publish songs and news you have listened to or read on your profile page

10 Trust & security issues in social networks (cont.)!10 Responsible sharing (e.g. a friend posted an embarrassing photo of a young political candidate Emma Kiernan enjoying a party) Anybody can post any picture of you on Facebook at any time! Even if deleted, it is there forever, stored in the vast Internet memory bank to be found again and again!

11 Trust & security issues in social networks (cont.)!11 Responsible sharing (e.g. top model Rosanagh Wypych posted photos of her and friends drinking alcohol and consuming cannabis)

12 Trust & security issues in social networks (cont.)!12 Wrong tags in Flickr! Challenges: Identify the most appropriate tags Eliminate noisy or spam tags Only around 50% of tags are truly related to an image [Kennedy et al., ACM MIR 2006]

13 Trust & security issues in social networks (cont.)!13 Spam bookmarks in Delicious

14 Trust & security solutions in social networks!14

15 Trust & security solutions in social networks (cont.)!15 Limit number of people to share content and communications with create private groups (e.g. Google+ Circles, Facebook Smart Lists)

16 Trust & security solutions in social networks (cont.)!16 Limit time to watch shared content (e.g. SnapChat application though they are not able to guarantee that your messaging data will be deleted in all instances)

17 Trust & security solutions in social networks (cont.)!17 Manage your account (friends, photos, comments, posts) Make sure that what you are sharing or posting is not going to cause regret

18 Trust & security before social media!18 ! Web search! Web videos! Blogs! Online shopping systems! Peer-to-peer (P2P) networks

19 Anti-spam strategies in online systems!19 [Heymann, Koutrika, Garcia-Molina, IEEE IC 2007]

20 Trust and reputation online systems!20

21 Trust and reputation online systems (cont.)!21 spam filtering

22 Model of social tagging system!22 [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]

23 Categorization of trust models!23 [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]

24 User versus content trust modeling!24 User trust modeling is more popular than content trust modeling: User trust models has a less complexity than content trust models User trust models can quickly adapt to the constantly evolving and changing environment in social systems due to the type of features used for modeling, and thus be applicable longer than content trust models, without need for creation of new models User trust modeling has a disadvantage of broad brush, i.e. it may be excessively strict if a user happens to post one bit of questionable content on otherwise legitimate content Subjectivity in classifying spam and non-spam content/ users remains as a fundamental issue, i.e. what is spam content/user to one person may be interesting to another one

25 Summary of representative recent techniques!25 Reference Trust model Media Method Dataset Gyongyi et al Koutrika et al Wu et al Liu et al content web pages an iterative approach, called TrustRank, to propagate trust scores to all nodes in the graph by splitting the trust score of a node among its neighbors according to a weighting scheme content bookmarks a coincidence-based model for query-by-tag search which estimates the level of agreement among different users in the system for a given tag content images a computer vision technique based on low-level image features to detect embedded text and computer-generated graphics content & user bookmarks an iterative approach to identify spam content by its information value extracted from the collaborative knowledge AltaVista, real Delicious, real & simulated SpamArchive & Ling-Spam, real Delicious, real Bogers and Van den Bosch 2008 content & user bookmarks KL-divergence to measure the similarity between language models and new posts BibSonomy & CiteULike, real Ivanov et al user images an approach based on the feedback from other users who agree or disagree with a tag associated with an image Panoramio, real [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]

26 Summary of representative recent techniques (cont.)!26 Reference Trust model Media Method Dataset Xu et al Krestel and Chen 2008 Benevenuto et al Lee et al Krause et al Markines et al user bookmarks an iterative approach to compute the goodness of each tag with respect to a content and the authority scores of the users user bookmarks a TrustRank-based approach using features which model tag co-occurance, content co-occurance and co-occurance of tag-content user videos a supervised learning approach applied on features that reflect users behavior through video responses user tweets a machine learning approach applied on social honeypots including users profile and tweets features user bookmarks a machine learning approach applied on a user s profile, bookmarking activity and context of tags features user bookmarks a machine learning approach applied on tag-, content- and user-based features MyWeb 2.0, real BibSonomy, real YouTube, real Twitter, real & simulated BibSonomy, real BibSonomy, real Caverlee et al user user profiles an approach to compute a dynamic trust score, called SocialTrust, depending on the quality of MySpace, real the relationship and personalized feedback ratings [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]

27 Open issues & challenges!27 Publicly available datasets: Publication of datasets from different social networks and even different datasets of one social network for evaluation of trust modeling approaches is rarely found, which makes it difficult to compare results and performance of different trust models Most of the datasets provide data for evaluating only one aspect of trust modeling, either user or content trust modeling, while evaluation of the other aspect requires introducing simulated objects in the real-world social tagging datasets

28 Open issues & challenges (cont.)!28 Dynamics of trust: User s trust tends to vary over time according to the user s experience and evolvement of social networks Only a few approaches deal with dynamics of trust by distinguishing between recent and old tags

29 Open issues & challenges (cont.)!29 Multilingualism: Most of the existing trust modeling approaches based on text information assume monolingual environments Some text information may be regarded as wrong due to the language difference people from various countries, so various languages simultaneously appear in tags and comments

30 Open issues & challenges (cont.)!30 Interaction across social networks: How trust models across domains can be effectively connected and shared? E.g. users can use their Facebook accounts to log in some other social network services

31 Open issues & challenges (cont.)!31 Multimodal analysis: Most of the current techniques for noise and spam reduction focus only on textual tag processing and user profile analysis, while audio and visual content features of multimedia content can also provide useful information about the relevance of the content and content-tag relationship

32 References!32 B. Sigurbjornsson, and R. van Zwol, "Flickr tag recommendation based on collective knowledge," in Proc. WWW, Apr. 2008, pp L. S. Kennedy, S.-F. Chang, and I. V. Kozintsev, To search or to label?: Predicting the performance of searchbased automatic image classifiers, in Proc. ACM MIR, Oct. 2006, pp K. Liu, B. Fang, and Y. Zhang, Detecting tag spam in social tagging systems with collaborative knowledge, in Proc. IEEE FSKD, Aug. 2009, pp P. Heymann, G. Koutrika, and H. Garcia-Molina, Fighting spam on social web sites: A survey of approaches and future challenges, IEEE Internet Comput., vol. 11, no. 6, pp , Nov X. Li, C. Snoek, and M. Worring, "Learning tag relevance by neighbor voting for social image retrieval," in Proc. ACM MIR, Oct. 2008, pp B. Markines, C. Cattuto, and F. Menczer, Social spam detection, in Proc. ACM AIRWeb, Apr. 2009, pp B. Krause, C. Schmitz, A. Hotho, and Stum G., The anti-social tagger: Detecting spam in social bookmarking systems, in Proc. ACM AIRWeb, Apr. 2008, pp G. Koutrika, F. A. Effendi, Z. Gyongyi, P. Heymann, and H. Garcia-Molina, Combating spam in tagging systems: An evaluation, ACM TWEB, vol. 2, no. 4, pp. 22:1 22:34, Oct Z. Gyongyi, H. Garcia-Molina, and J. Pedersen, Combating web spam with TrustRank, in Proc. VLDB, Aug. 2004, pp C.-T. Wu, K.-T. Cheng, Q. Zhu, and Y.-L. Wu, Using visual features for anti-spam filtering, in Proc. IEEE ICIP, Sep. 2005, vol. 3, pp. III

33 References (cont.)!33 I. Ivanov, P. Vajda, J.-S. Lee, and T. Ebrahimi, "In tags we trust: Trust modeling in social tagging of multimedia content," in IEEE SPM, vol. 29, no. 2, pp , Mar I. Ivanov, P. Vajda, J.-S. Lee, L. Goldmann, and T. Ebrahimi, Geotag propagation in social networks based on user trust model, MTAP, vol. 56, no. 1, pp , Jan I. Ivanov, P. Vajda, L. Goldmann, J.-S. Lee, and T. Ebrahimi, "Object-based tag propagation for semiautomatic annotation of images," in Proc. ACM MIR, Mar. 2010, pp T. Bogers and A. Van den Bosch, Using language models for spam detection in social bookmarking, in Proc. ECML PKDD, Sep. 2008, pp Z. Xu, Y. Fu, J. Mao, and D. Su, Towards the semantic web: Collaborative tag suggestions, in Proc. ACM WWW, May R. Krestel and L. Chen, Using co-occurence of tags and resources to identify spammers, in Proc. ECML PKDD, Sep. 2008, pp F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonc alves, Detecting spammers and content promoters in online video social networks, in Proc. ACM SIGIR, Jul. 2009, pp K. Lee, J. Caverlee, and S. Webb, Uncovering social spammers: social honeypots + machine learning, in Proc. ACM SIGIR, Jul. 2010, pp M. G. Noll, C. A. Yeung, N. Gibbins, C. Meinel, and N. Shadbolt, Telling experts from spammers: Expertise ranking in folksonomies, in Proc. ACM SIGIR, Jul. 2009, pp J. Caverlee, L. Liu, and S. Webb, SocialTrust: Tamper-resilient trust establishment in online communities, in Proc. ACM JCDL, Jun. 2008, pp A. Hotho, D. Benz, R. J aschke, and B. Krause, Eds., ECML PKDD Discovery Challenge, Sep. 2008, Available at:

34 Any question? Prof. Touradj Ebrahimi MMSPG EPFL

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach Alex Hai Wang College of Information Sciences and Technology, The Pennsylvania State University, Dunmore, PA 18512, USA

More information

Personalizing Image Search from the Photo Sharing Websites

Personalizing Image Search from the Photo Sharing Websites Personalizing Image Search from the Photo Sharing Websites Swetha.P.C, Department of CSE, Atria IT, Bangalore swethapc.reddy@gmail.com Aishwarya.P Professor, Dept.of CSE, Atria IT, Bangalore aishwarya_p27@yahoo.co.in

More information

Personalized Image Search for Photo Sharing Website

Personalized Image Search for Photo Sharing Website Personalized Image Search for Photo Sharing Website Asst. Professor Rajni Pamnani rajaniaswani@somaiya.edu Manan Desai manan.desai@somaiya.edu Varshish Bhanushali varshish.b@somaiya.edu Ashish Charla ashish.charla@somaiya.edu

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

Optimization of Image Search from Photo Sharing Websites Using Personal Data

Optimization of Image Search from Photo Sharing Websites Using Personal Data Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search

More information

End of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net

End of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Content Report November 2014 Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Dashboard Page 1 Overall Choices Site Visits Tag cloud showing end of life

More information

Social Spam Detection

Social Spam Detection Social Spam Detection Benjamin Markines,2 Ciro Cattuto 2 Filippo Menczer,2 School of Informatics, Indiana University, Bloomington, Indiana, USA 2 Complex Networks Lagrange Laboratory, Institute for Scientific

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

DON T FOLLOW ME: SPAM DETECTION IN TWITTER

DON T FOLLOW ME: SPAM DETECTION IN TWITTER DON T FOLLOW ME: SPAM DETECTION IN TWITTER Alex Hai Wang College of Information Sciences and Technology, The Pennsylvania State University, Dunmore, PA 18512, USA hwang@psu.edu Keywords: Abstract: social

More information

Automatic Web Tagging and Person Tagging Using Language Models

Automatic Web Tagging and Person Tagging Using Language Models Automatic Web Tagging and Person Tagging Using Language Models Qiaozhu Mei 1 and Yi Zhang 2 1 University of Illinois at Urbana-Champaign, USA qmei2@uiuc.edu 2 University of California at Santa Cruz, USA

More information

Social-Sensed Multimedia Computing

Social-Sensed Multimedia Computing Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors

More information

Network-based spam filter on Twitter

Network-based spam filter on Twitter Network-based spam filter on Twitter Ziyan Zhou Stanford University ziyanjoe@stanford.edu Lei Sun Stanford University sunlei@stanford.edu ABSTRACT Rapidly growing micro-blogging social networks, such as

More information

Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades

Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades 1 Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades Alvin Junus, Ming Cheung, James She and Zhanming Jie HKUST-NIE Social Media Lab, Hong Kong University of Science and Technology

More information

Detection of Malicious URLs by Correlating the Chains of Redirection in an Online Social Network (Twitter)

Detection of Malicious URLs by Correlating the Chains of Redirection in an Online Social Network (Twitter) International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 3, July 2014, PP 33-38 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Detection

More information

Bayesian Spam Filtering

Bayesian Spam Filtering Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary amaobied@ucalgary.ca http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating

More information

Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods

Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods Pedram Hayati, Vidyasagar Potdar Digital Ecosystem and Business Intelligence (DEBI) Institute, Curtin University of Technology, Perth, WA, Australia

More information

MLg. Big Data and Its Implication to Research Methodologies and Funding. Cornelia Caragea TARDIS 2014. November 7, 2014. Machine Learning Group

MLg. Big Data and Its Implication to Research Methodologies and Funding. Cornelia Caragea TARDIS 2014. November 7, 2014. Machine Learning Group Big Data and Its Implication to Research Methodologies and Funding Cornelia Caragea TARDIS 2014 November 7, 2014 UNT Computer Science and Engineering Data Everywhere Lots of data is being collected and

More information

LinksTo A Web2.0 System that Utilises Linked Data Principles to Link Related Resources Together

LinksTo A Web2.0 System that Utilises Linked Data Principles to Link Related Resources Together LinksTo A Web2.0 System that Utilises Linked Data Principles to Link Related Resources Together Owen Sacco 1 and Matthew Montebello 1, 1 University of Malta, Msida MSD 2080, Malta. {osac001, matthew.montebello}@um.edu.mt

More information

Social Media Statistics. What is going on out there

Social Media Statistics. What is going on out there Social Media Statistics What is going on out there What is Social Media? It s a great big machine allowing people to talk to each other, about everything and nothing, all the time, where ever the are or..

More information

Conventional. Personalized

Conventional. Personalized Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Personalized

More information

Your Business s Online Check-Up

Your Business s Online Check-Up 1 Did you know?... From the smallest start-up to a multi-generational family business to Fortune 500 companies, all businesses have a web identity or citation made up of the business name, address, phone

More information

6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME

6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)

More information

Learn to Personalized Image Search from the Photo Sharing Websites

Learn to Personalized Image Search from the Photo Sharing Websites Learn to Personalized Image Search from the Photo Sharing Websites ABSTRACT: Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment

More information

Email Spam Detection A Machine Learning Approach

Email Spam Detection A Machine Learning Approach Email Spam Detection A Machine Learning Approach Ge Song, Lauren Steimle ABSTRACT Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn

More information

Fraudulent Support Telephone Number Identification Based on Co-occurrence Information on the Web

Fraudulent Support Telephone Number Identification Based on Co-occurrence Information on the Web Fraudulent Support Telephone Number Identification Based on Co-occurrence Information on the Web Xin Li, Yiqun Liu, Min Zhang, Shaoping Ma State Key Laboratory of Intelligent Technology and Systems Tsinghua

More information

The role of multimedia in archiving community memories

The role of multimedia in archiving community memories The role of multimedia in archiving community memories Jonathon S. Hare, David P. Dupplaw, Wendy Hall, Paul H. Lewis, and Kirk Martinez Electronics and Computer Science, University of Southampton, Southampton,

More information

BT Retail Social Media making it easy for our customers

BT Retail Social Media making it easy for our customers BT Retail Social Media making it easy for our customers Dawn Walton, GM Central Planning Nigel Elliott, Social Media Channel Manager Kerry Gulloch, Social Media Communities Manager Agenda o How we ended

More information

Detecting Linkedin Spammers and its Spam Nets

Detecting Linkedin Spammers and its Spam Nets Detecting Linkedin Spammers and its Spam Nets Víctor M. Prieto, Manuel Álvarez and Fidel Cacheda Department of Information and Communication Technologies, University of A Coruña, Coruña, Spain 15071 Email:

More information

Folksonomies versus Automatic Keyword Extraction: An Empirical Study

Folksonomies versus Automatic Keyword Extraction: An Empirical Study Folksonomies versus Automatic Keyword Extraction: An Empirical Study Hend S. Al-Khalifa and Hugh C. Davis Learning Technology Research Group, ECS, University of Southampton, Southampton, SO17 1BJ, UK {hsak04r/hcd}@ecs.soton.ac.uk

More information

Collaborative Filteration for user behavior Prediction using Big Data Hadoop

Collaborative Filteration for user behavior Prediction using Big Data Hadoop Collaborative Filteration for user behavior Prediction using Big Data Hadoop Jayshri Manohar Somwanshi, Prof. Y. B. Gurav Department of Computer Engineering, P.V.P.I.T Bavdhan, Pune, Maharashtra, India

More information

Business Challenges and Research Directions of Management Analytics in the Big Data Era

Business Challenges and Research Directions of Management Analytics in the Big Data Era Business Challenges and Research Directions of Management Analytics in the Big Data Era Abstract Big data analytics have been embraced as a disruptive technology that will reshape business intelligence,

More information

Web Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113

Web Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113 CSE 450 Web Mining Seminar Spring 2008 MWF 11:10 12:00pm Maginnes 113 Instructor: Dr. Brian D. Davison Dept. of Computer Science & Engineering Lehigh University davison@cse.lehigh.edu http://www.cse.lehigh.edu/~brian/course/webmining/

More information

Exploring Big Data in Social Networks

Exploring Big Data in Social Networks Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about

More information

PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL

PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL Journal homepage: www.mjret.in ISSN:2348-6953 PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL Utkarsha Vibhute, Prof. Soumitra

More information

How To Measure Spam On Multiple Platforms

How To Measure Spam On Multiple Platforms Observing Common Spam in Tweets and Email Cristian Lumezanu NEC Laboratories America Princeton, NJ lume@nec-labs.com Nick Feamster University of Maryland College Park, MD feamster@cs.umd.edu ABSTRACT Spam

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

Keywords Big Data; OODBMS; RDBMS; hadoop; EDM; learning analytics, data abundance.

Keywords Big Data; OODBMS; RDBMS; hadoop; EDM; learning analytics, data abundance. Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analytics

More information

Automatic Annotation Wrapper Generation and Mining Web Database Search Result

Automatic Annotation Wrapper Generation and Mining Web Database Search Result Automatic Annotation Wrapper Generation and Mining Web Database Search Result V.Yogam 1, K.Umamaheswari 2 1 PG student, ME Software Engineering, Anna University (BIT campus), Trichy, Tamil nadu, India

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

Measuring Propagation in Online Social Networks: The Case of YouTube

Measuring Propagation in Online Social Networks: The Case of YouTube Measuring Propagation in Online Social Networks: The Case of YouTube Amir Afrasiabi Rad a.afrasiabi@uottawa.ca EECS Morad Benyoucef Benyoucef@Telfer.uOttawa.ca Telfer School of Management University of

More information

Social networking guidelines and information

Social networking guidelines and information Social networking guidelines and information Introduction Social media is an emerging and changing landscape. The digital marketing communications team and corporate communications have a social media

More information

Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis

Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis Yue Dai, Ernest Arendarenko, Tuomo Kakkonen, Ding Liao School of Computing University of Eastern Finland {yvedai,

More information

How Social Media will Change the Future of Banking Services

How Social Media will Change the Future of Banking Services DOI: 10.7763/IPEDR. 2013. V65. 1 How Social Media will Change the Future of Banking Services Iwa Kuchciak 1 1 University of Lodz Abstract. Parallel with the growth of importance of social media there is

More information

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down.

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Access: It is the ability to see what you are trying to view (e.g. you can see a friend

More information

Methods of Social Media Research: Data Collection & Use in Social Media

Methods of Social Media Research: Data Collection & Use in Social Media Methods of Social Media Research: Data Collection & Use in Social Media Florida State University College of Communication and Information Sanghee Oh shoh@cci.fsu.edu Overview Introduction to myself Introduction

More information

Spam Filtering in Online Social Networks Using Machine Learning Technique

Spam Filtering in Online Social Networks Using Machine Learning Technique Spam Filtering in Online Social Networks Using Machine Learning Technique T.Suganya 1, T.Hemalatha 2 ME (final year), Department of Computer Science and Engineering, Karpagam University, Coimbatore, India

More information

CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance

CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of

More information

Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification

Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Computer Forensics Application ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Project Overview A new framework that provides additional clues extracted from images

More information

CitationBase: A social tagging management portal for references

CitationBase: A social tagging management portal for references CitationBase: A social tagging management portal for references Martin Hofmann Department of Computer Science, University of Innsbruck, Austria m_ho@aon.at Ying Ding School of Library and Information Science,

More information

Combating Spam in Tagging Systems: An Evaluation

Combating Spam in Tagging Systems: An Evaluation Combating Spam in Tagging Systems: An Evaluation GEORGIA KOUTRIKA Computer Science Department, Stanford University FRANS ADJIE EFFENDI Computer Science Department, Stanford University ZOLTÁN GYÖNGYI Computer

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 4, AUGUST 2012 963. Learn to Personalized Image Search From the Photo Sharing Websites

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 4, AUGUST 2012 963. Learn to Personalized Image Search From the Photo Sharing Websites IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 4, AUGUST 2012 963 Learn to Personalized Image Search From the Photo Sharing Websites Jitao Sang, Changsheng Xu, Senior Member, IEEE, and Dongyuan Lu Abstract

More information

CHAPTER 2 Social Media as an Emerging E-Marketing Tool

CHAPTER 2 Social Media as an Emerging E-Marketing Tool Targeted Product Promotion Using Firefly Algorithm On Social Networks CHAPTER 2 Social Media as an Emerging E-Marketing Tool Social media has emerged as a common means of connecting and communication with

More information

Introduction to Social Media

Introduction to Social Media Introduction to Social Media Today s Discussion Overview of Web 2.0 and social media tools How EPA and other agencies are using these tools Agency and governmentwide policies governing use of tools Case

More information

Infographics in the Classroom: Using Data Visualization to Engage in Scientific Practices

Infographics in the Classroom: Using Data Visualization to Engage in Scientific Practices Infographics in the Classroom: Using Data Visualization to Engage in Scientific Practices Activity 4: Graphing and Interpreting Data In Activity 4, the class will compare different ways to graph the exact

More information

Best Practices for Social Media

Best Practices for Social Media for Social Media Content Provided by Define Your Goals Your goals should say what you hope to accomplish. Example of goals include: Increase awareness with current customers Connect with new customers

More information

Lecture Overview. Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Web 2.0 Definition. Web 2.

Lecture Overview. Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Web 2.0 Definition. Web 2. Lecture Overview Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Martin Halvey Introduction to Web 2.0 Overview of Tagging Systems Overview of tagging Design and attributes

More information

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a

More information

The mobile opportunity: How to capture upwards of 200% in lost traffic

The mobile opportunity: How to capture upwards of 200% in lost traffic June 2014 BrightEdge Mobile Share Report The mobile opportunity: How to capture upwards of 200% in lost traffic You ve likely heard that mobile website optimization is the next frontier, and you ve probably

More information

Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS

Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS This resource provides a sampling of tools available to produce social media metrics. The list

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Intinno: A Web Integrated Digital Library and Learning Content Management System

Intinno: A Web Integrated Digital Library and Learning Content Management System Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master

More information

Spam Filtering in Twitter using Sender-Receiver Relationship

Spam Filtering in Twitter using Sender-Receiver Relationship Spam Filtering in Twitter using Sender-Receiver Relationship Jonghyuk Song 1, Sangho Lee 1 and Jong Kim 2 1 Dept. of CSE, POSTECH, Republic of Korea {freestar,sangho2}@postech.ac.kr 2 Div. of ITCE, POSTECH,

More information

Social Media Guidelines for Best Practice

Social Media Guidelines for Best Practice Social Media Guidelines for Best Practice September 2009 Contents: Listen and research the social media environment Page 3 & 4 Set the parameters before you start Page 4 Getting Started Page 5-6 In Summary

More information

Image Spam Filtering by Content Obscuring Detection

Image Spam Filtering by Content Obscuring Detection Image Spam Filtering by Content Obscuring Detection Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli Dept. of Electrical and Electronic Eng., University of Cagliari Piazza d Armi, 09123 Cagliari,

More information

CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science

CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science Dr. Daisy Zhe Wang CISE Department University of Florida August 25th 2014 20 Review Overview of Data Science Why Data

More information

LOW COST PAGE QUALITY FACTORS TO DETECT WEB SPAM

LOW COST PAGE QUALITY FACTORS TO DETECT WEB SPAM LOW COST PAGE QUALITY FACTORS TO DETECT WEB SPAM Ashish Chandra, Mohammad Suaib, and Dr. Rizwan Beg Department of Computer Science & Engineering, Integral University, Lucknow, India ABSTRACT Web spam is

More information

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines , 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing

More information

SOCIAL MEDIA MARKETING 101. By Debbie Laskey, MBA

SOCIAL MEDIA MARKETING 101. By Debbie Laskey, MBA SOCIAL MEDIA MARKETING 101 By Debbie Laskey, MBA Marketing, Strategic Branding, Communications & Website Consultant December 2009 What is social media? According to Wikipedia, the term social media has

More information

Measuring and Monitoring Customer Experience

Measuring and Monitoring Customer Experience Measuring and Monitoring Experience Tom Exeter Sales, Marketing & Experience Executive Sport & Physical Activity, Commercial Services, University of Leeds Background to our organisation. The department

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Fraud Detection in Electronic Auction

Fraud Detection in Electronic Auction Fraud Detection in Electronic Auction Duen Horng Chau 1, Christos Faloutsos 2 1 Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

IJREAS Volume 2, Issue 2 (February 2012) ISSN: 2249-3905 STUDY OF SEARCH ENGINE OPTIMIZATION ABSTRACT

IJREAS Volume 2, Issue 2 (February 2012) ISSN: 2249-3905 STUDY OF SEARCH ENGINE OPTIMIZATION ABSTRACT STUDY OF SEARCH ENGINE OPTIMIZATION Sachin Gupta * Ankit Aggarwal * ABSTRACT Search Engine Optimization (SEO) is a technique that comes under internet marketing and plays a vital role in making sure that

More information

Florida International University - University of Miami TRECVID 2014

Florida International University - University of Miami TRECVID 2014 Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,

More information

Financial Trading System using Combination of Textual and Numerical Data

Financial Trading System using Combination of Textual and Numerical Data Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,

More information

A Dynamic Approach to Extract Texts and Captions from Videos

A Dynamic Approach to Extract Texts and Captions from Videos Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

AUSTRALIAN ONLINE LANDSCAPE REVIEW MAY 2013

AUSTRALIAN ONLINE LANDSCAPE REVIEW MAY 2013 AUSTRALIAN ONLINE LANDSCAPE REVIEW MAY 2013 SIGNIFICANT ENHANCEMENTS TO NIELSEN ONLINE RATINGS HYBRID DATA Summary: May data represents a trend break versus prior months across all metrics for Online Ratings

More information

SocialTrust++: Building Community-Based Trust in Social Information Systems

SocialTrust++: Building Community-Based Trust in Social Information Systems SocialTrust++: Building Community-Based Trust in Social Information Systems James Caverlee, Zhiyuan Cheng, Brian Eoff, Chiao-Fang Hsu, Krishna Kamath, Said Kashoob, Jeremy Kelley, Elham Khabiri, and Kyumin

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

Contemporary Techniques for Data Mining Social Media

Contemporary Techniques for Data Mining Social Media Contemporary Techniques for Data Mining Social Media Stephen Cutting (100063482) 1 Introduction Social media websites such as Facebook, Twitter and Google+ allow millions of users to communicate with one

More information

Computing & Telecommunications Services Monthly Report March 2015

Computing & Telecommunications Services Monthly Report March 2015 March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified

More information

Partially Supervised Word Alignment Model for Ranking Opinion Reviews

Partially Supervised Word Alignment Model for Ranking Opinion Reviews International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 Partially Supervised Word Alignment Model for Ranking Opinion Reviews Rajeshwari

More information

Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction

Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction There has been a dramatic increase in the number of people who are becoming self-reliant travelers; using online communities,

More information

A Survey on Product Aspect Ranking

A Survey on Product Aspect Ranking A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,

More information

Entrepreneurship Center

Entrepreneurship Center Entrepreneurship Center Basic Concepts Using The Internet to Market Your Business Search Engines Basics Copyright 2009 tenby technologies 2 Using The Internet To Market Your Business Internet marketing

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

12 months 4 quarters 1 goal

12 months 4 quarters 1 goal 12 months 4 quarters 1 goal You know you need to whip your digital marketing game into shape. But you also know budgets are tight. If you're ready to take your online marketing to the next level without

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Canonical Image Selection for Large-scale Flickr Photos using Hadoop

Canonical Image Selection for Large-scale Flickr Photos using Hadoop Canonical Image Selection for Large-scale Flickr Photos using Hadoop Guan-Long Wu National Taiwan University, Taipei Nov. 10, 2009, @NCHC Communication and Multimedia Lab ( 通 訊 與 多 媒 體 實 驗 室 ), Department

More information

Subordinating to the Majority: Factoid Question Answering over CQA Sites

Subordinating to the Majority: Factoid Question Answering over CQA Sites Journal of Computational Information Systems 9: 16 (2013) 6409 6416 Available at http://www.jofcis.com Subordinating to the Majority: Factoid Question Answering over CQA Sites Xin LIAN, Xiaojie YUAN, Haiwei

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

int.ere.st: Building a Tag Sharing Service with the SCOT Ontology

int.ere.st: Building a Tag Sharing Service with the SCOT Ontology int.ere.st: Building a Tag Sharing Service with the SCOT Ontology HakLae Kim, John G. Breslin Digital Enterprise Research Institute National University of Ireland, Galway IDA Business Park, Lower Dangan

More information

The British Academy of Management. Website and Social Media Policy

The British Academy of Management. Website and Social Media Policy The British Academy of Management s Website and Social Media Policy The creation of management knowledge through research and its dissemination through teaching and application The British Academy of Management

More information

Image Spam Filtering Using Visual Information

Image Spam Filtering Using Visual Information Image Spam Filtering Using Visual Information Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli, Dept. of Electrical and Electronic Eng., Univ. of Cagliari Piazza d Armi, 09123 Cagliari, Italy

More information

How To Cluster On A Search Engine

How To Cluster On A Search Engine Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING

More information