题名 | Making tagging systems resistant to tricky spam attacks |
作者 | |
发表日期 | 2016-07-20 |
会议名称 | Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015 |
会议录名称 | Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015
![]() |
页码 | 871-879 |
会议日期 | 2015-08-10——2015-08-10 |
会议地点 | chn,Beijing |
摘要 | Tagging systems are known vulnerable to tag spam. While there have been efforts aiming at addressing this problem, tricky spam attackers could exploit and leverage vulnerabilities within them to invalidate these seemingly robust efforts. Rather than fully solving the problem of tricky spam attacks which has been demonstrated almost impossible, this paper aims to mitigate the effect from tricky spam attacks, providing high-quality tag search results to normal users. To achieve this goal, we leverage two key insights exploited from current tagging systems, 1) altruistic users and 2) social networking context, to design a novel reputation-based spam-resistant approach. With our approach, it would be very high probability for normal users to pick their expected content from tag search results, thus decreasing the effect of tag spam. Our experimental results indicate the approach makes at best-effort defense against tricky spam attacks and work better than existing efforts. |
DOI | 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.169 |
URL | 查看来源 |
语种 | 英语English |
Scopus入藏号 | 2-s2.0-84983373223 |
引用统计 | |
文献类型 | 会议论文 |
条目标识符 | https://repository.uic.edu.cn/handle/39GCC9TT/13506 |
专题 | 个人在本单位外知识产出 |
作者单位 | School of EECS, Peking University, China, Key Laboratory of High Confidence Software Technologies, Ministry of Education, China |
推荐引用方式 GB/T 7714 | Li,Zhou,Tang,Cong,Hu,Jianbinet al. Making tagging systems resistant to tricky spam attacks[C], 2016: 871-879. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
查看访问统计 |
谷歌学术 |
谷歌学术中相似的文章 |
[Li,Zhou]的文章 |
[Tang,Cong]的文章 |
[Hu,Jianbin]的文章 |
百度学术 |
百度学术中相似的文章 |
[Li,Zhou]的文章 |
[Tang,Cong]的文章 |
[Hu,Jianbin]的文章 |
必应学术 |
必应学术中相似的文章 |
[Li,Zhou]的文章 |
[Tang,Cong]的文章 |
[Hu,Jianbin]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论