The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Hubs, authorities, and communities
ACM Computing Surveys (CSUR)
Modern Information Retrieval
A Comparative Study on Feature Selection in Text Categorization
ICML '97 Proceedings of the Fourteenth International Conference on Machine Learning
Redundancy based feature selection for microarray data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Spam, damn spam, and statistics: using statistical analysis to locate spam web pages
Proceedings of the 7th International Workshop on the Web and Databases: colocated with ACM SIGMOD/PODS 2004
Large Margin Methods for Structured and Interdependent Output Variables
The Journal of Machine Learning Research
Image Analysis for Efficient Categorization of Image-based Spam E-mail
ICDAR '05 Proceedings of the Eighth International Conference on Document Analysis and Recognition
Working Set Selection Using Second Order Information for Training Support Vector Machines
The Journal of Machine Learning Research
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Evolution of Networks: From Biological Nets to the Internet and WWW (Physics)
Evolution of Networks: From Biological Nets to the Internet and WWW (Physics)
Workload models of spam and legitimate e-mails
Performance Evaluation
Combating spam in tagging systems
AIRWeb '07 Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
Improving spam detection based on structural similarity
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Know your neighbors: web spam detection using the web topology
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Shaking hands, kissing babies, and…blogging?
Communications of the ACM - ACM's plan to go online first
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Youtube traffic characterization: a view from the edge
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges
IEEE Internet Computing
Combating web spam with trustrank
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Understanding video interactions in youtube
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web
Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries
Detecting spammers and content promoters in online video social networks
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
Video interactions in online video social networks
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A brief survey of computational approaches in social computing
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
A contextual analysis of the YouTube duplicate content
WebMedia '09 Proceedings of the XV Brazilian Symposium on Multimedia and the Web
Evaluation of users access and navigation profiles on web video sharing environments
WebMedia '09 Proceedings of the XV Brazilian Symposium on Multimedia and the Web
Dependable filtering: Philosophy and realizations
ACM Transactions on Information Systems (TOIS)
Foundations and Trends in Information Retrieval
Broadcast yourself: understanding YouTube uploaders
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
A survey of emerging approaches to spam filtering
ACM Computing Surveys (CSUR)
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Proceedings of the 21st international conference on World Wide Web
A framework for unsupervised spam detection in social networking sites
ECIR'12 Proceedings of the 34th European conference on Advances in Information Retrieval
Twitter games: how successful spammers pick targets
Proceedings of the 28th Annual Computer Security Applications Conference
International Journal of Information Retrieval Research
Hi-index | 0.00 |
In many video social networks, including YouTube, users are permitted to post video responses to other users' videos. Such a response can be legitimate or can be a video response spam, which is a video response whose content is not related to the topic being discussed. Malicious users may post video response spam for several reasons, including increase the popularity of a video, marketing advertisements, distribute pornography, or simply pollute the system. In this paper we consider the problem of detecting video spammers. We first construct a large test collection of YouTube users, and manually classify them as either legitimate users or spammers. We then devise a number of attributes of video users and their social behavior which could potentially be used to detect spammers. Employing these attributes, we apply machine learning to provide a heuristic for classifying an arbitrary video as either legitimate or spam. The machine learning algorithm is trained with our test collection. We then show that our approach succeeds at detecting much of the spam while only falsely classifying a small percentage of the legitimate videos as spam. Our results highlight the most important attributes for video response spam detection.