A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Splog detection using self-similarity analysis on blog temporal dynamics
2007
Proceedings of the 3rd international workshop on Adversarial information retrieval on the web - AIRWeb '07
We first represent the blog temporal dynamics using self-similarity matrices defined on the histogram intersection similarity measure of the time, content, and link attributes of posts. ...
The presence of splogs degrades blog search results as well as wastes network resources. In our approach we exploit unique blog temporal dynamics to detect splogs. ...
dynamics. ...
doi:10.1145/1244408.1244410
fatcat:62flgqe3vjcnphcnvvuxitellq
Detecting splogs via temporal dynamics using self-similarity analysis
2008
ACM Transactions on the Web
Detecting splogs via temporal dynamics using self-similarity analysis. ...
(b) We study the blog temporal characteristics using a visual representation derived from the self-similarity measures. ...
Detecting Splogs via Temporal Dynamics Using Self-Similarity Analysis • 4:21 Table I . ...
doi:10.1145/1326561.1326565
fatcat:tyh5objdjvdinni3l5ansuxcwu
Splog Detection using Content, Time and Link Structures
2007
Multimedia and Expo, 2007 IEEE International Conference on
In our approach we exploit unique blog temporal dynamics to detect splogs. ...
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste network resources. ...
Therefore, extracting and using temporal dynamics is critical to detecting splogs. ...
doi:10.1109/icme.2007.4285079
dblp:conf/icmcs/LinSCTT07
fatcat:oul5q7j6ovdydiatkodx42kqmq
Splog Filtering Based on Writing Consistency
2008
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
The experimental results on Blog06 data set show that, proposed measure can effectively detect splogs, reaching an accuracy of 90%. ...
Inspired by the observation that fake writers (writers of splogs) have striking higher consistent writing behavior than real writers (writers of legitimate blogs), we propose to detect splogs by distinguishing ...
It is suggested that high self-similarity is a good indicator of splogs. The dynamics of blogs can be used to detect splogs. ...
doi:10.1109/wiiat.2008.21
dblp:conf/webi/LiuTXW08
fatcat:lwfzzumgprcndlsuiygim77pgy
Adversarial Information Retrieval on the Web (AIRWeb 2007)
2008
SIGIR Forum
Session 1: Temporal and Topological Factors Belle Tseng started the morning session with her presentation on "Splog Detection Using Self-Similarity Analysis on Blog Temporal Dynamics" [9] . ...
She presented their solution to splog detection which has three salient features: self-similarity analysis, visual characterization, and temporal feature computation. ...
doi:10.1145/1394251.1394267
fatcat:ywd3ygzofbbjtbwxshwgu3opy4
Proliferation and Detection of Blog Spam
2010
IEEE Security and Privacy
blog temporal characteristics in self-similarity matrices and detects splogs through regularity and joint features across different attributes. ...
Along a similar idea, Yu-ru Lin and his colleagues proposed detecting splogs by temporal characteristics as well as content. 3 To make splogs appear relevant to blog search engines, their content is ...
doi:10.1109/msp.2010.113
fatcat:i3syjhywnnha3awunmha7z4fau
Blogosphere
2008
SIGKDD Explorations
hyperlinks to classify a blog post as spam using a SVM based classifier
• Lin et al. 2007 , consider the temporal dynamics of blog posts and propose a self similarity based splog detection algorithm ...
based on characteristic patterns found in splogs like, -Regularities or patterns in posting times of splogs, -Content similarity in splogs, and -Similar links in splogs ...
doi:10.1145/1412734.1412737
fatcat:v4ec3j66aragrnczjlisl6yowe
Modeling and Data Mining in Blogosphere
2009
Synthesis Lectures on Data Mining and Knowledge Discovery
We elaborate on data collection procedures, provide resources for blog data repositories, mention various visualization and analysis tools in Blogosphere, and explain conventional and novel evaluation ...
We elaborate on approaches that extract communities and cluster blogs based on information of the bloggers. ...
Cerra for helping us throughout this project. The work is part of the projects sponsored by grants from AFOSR and ONR. ...
doi:10.2200/s00213ed1v01y200907dmk001
fatcat:ifz4ic57sfcwbltrboans35zzm
Blog Preservation: Current Challenges and a New Paradigm
[chapter]
2013
Lecture Notes in Business Information Processing
We argue that current web archiving solutions are not able to capture the dynamic and continuously evolving nature of blogs, their network and social structure as well as the exchange of concepts and ideas ...
term blog preservation and knowledge management. ...
The types of features that can be used to detect spam can be grouped in spatial and temporal features. ...
doi:10.1007/978-3-642-40654-6_3
fatcat:3o4swju4abal5ak4dfn6daxvqi
Uncovering deep user context from blogs
2008
Proceedings of the second workshop on Analytics for noisy unstructured text data - AND '08
Using HAL, a method validated by cognitive science, the text from a large number of blog entries was analysed to uncover changes in entries author's sense-of-self. ...
The data requires analysis methods that have a relationship to human information processing: socio-cognitively motivated semantic systems. ...
Movement in sense-of-self is determined using temporally determined sense-of-self points for individual authors. ...
doi:10.1145/1390749.1390758
dblp:conf/sigir/McArthur08
fatcat:t2tb2uranbb6livqdkudwu3rze
Adversarial Web Search
2010
Foundations and Trends in Information Retrieval
These observations can be used to build features that capture regularity and self-similarity of temporal patterns, and these features can yield substantial improvements in the accuracy of a splog detection ...
The analysis of the keywords may lead to insights that help build better splog detection systems. ...
doi:10.1561/1500000021
fatcat:toxnvajrmbdppf5hytdbnykuiq
Data Mining in Social Media
[chapter]
2011
Social Network Data Analytics
blogs. ...
This chapter introduces the basics of data mining, reviews social media, discusses how to mine social media data, and highlights some illustrative examples with an emphasis on social networking sites and ...
The second author would like to acknowledge the grants by AFOSR (FA95500810132) and NSF (#0812551) on social computing and data mining. ...
doi:10.1007/978-1-4419-8462-3_12
fatcat:hbngavq4frhl7fenghg6rlomn4
Blogs and the Narrativity of Experience
2008
Social Science Research Network
Blogs and the Narrativity of Experience This paper undertakes an analysis of the narrativity of a form of discourse which has appeared recently (blogs) within the framework of an emergentist theory of ...
The narrative/discursive characteristics of blogs emerge from a preexistent ground of more basic or less specific communicative practices; and narrative discursivity itself is an emergent phenomenon with ...
temporal sequence, ready for analysis. ...
doi:10.2139/ssrn.1113321
fatcat:wjkbj5cxmreybm4pnnygai3cn4
Text Mining in Big Data Analytics
2020
Big Data and Cognitive Computing
In accordance with this, more than 200 academic journal articles on the subject are included and discussed in this review; the state-of-the-art text mining approaches and techniques used for analyzing ...
transcripts and speeches, meeting transcripts, and academic journal articles, as well as websites, emails, blogs, and social media platforms, across a broad range of application areas are also investigated ...
most likely to blog about a specific topic and in identifying the associated links for a given blog post on a given topic and detect splog. ...
doi:10.3390/bdcc4010001
fatcat:6fvmne7f2fbovjp4na5hl2tmv4
Augmenting User Models with Real World Experiences to Enhance Personalization and Adaptation
[chapter]
2012
Lecture Notes in Computer Science
This changes the way we use technologies and opens up new opportunities for personalization and adaptation. ...
People blog, post, chat, comment, tweet about things that matter to them: what they had for dinner, what their job activities were, what they thought about a particular television broadcast, et cetera. ...
Works on filtering spam blogs (or splogs) [15] as well as filtering blog spam comments [6] could also be linked to this study. ...
doi:10.1007/978-3-642-28509-7_4
fatcat:ogz2gojyszffvdtq6fy4itvite
« Previous
Showing results 1 — 15 out of 22 results