The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
An Evaluation of Statistical Approaches to Text Categorization
Information Retrieval
Large Margin Methods for Structured and Interdependent Output Variables
The Journal of Machine Learning Research
Working Set Selection Using Second Order Information for Training Support Vector Machines
The Journal of Machine Learning Research
Evolution of Networks: From Biological Nets to the Internet and WWW (Physics)
Evolution of Networks: From Biological Nets to the Internet and WWW (Physics)
Workload models of spam and legitimate e-mails
Performance Evaluation
Combating spam in tagging systems
AIRWeb '07 Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
Improving spam detection based on structural similarity
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Know your neighbors: web spam detection using the web topology
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Shaking hands, kissing babies, and…blogging?
Communications of the ACM - ACM's plan to go online first
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Youtube traffic characterization: a view from the edge
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges
IEEE Internet Computing
Detecting splogs via temporal dynamics using self-similarity analysis
ACM Transactions on the Web (TWEB)
Understanding video interactions in youtube
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Personalized presentations from community assets
Proceedings of the 19th Brazilian symposium on Multimedia and the web
Hi-index | 0.00 |
Various services on the Web 2.0 offer functions that allow users to post videos as response to a discussion topic. As an example, YouTube allows users to post video responses to an opening video topic. Such a video response can be a polluted video, aiming at increasing the popularity of the discussed topic, disseminating advertisements, distributing pornography or simple degrading the system reputation. Content pollution may compromise user satisfaction with the system since users cannot easily identify polluted content before watching at least a segment of it, consuming system resources, especially bandwidth. This work approaches the problem of detecting the malicious users who post polluted content. To do it, we construct a test collection with users from YouTube. Using attributes of users and videos, we apply a classification algorithm as approach to detect owners of polluted content. Additionally, we build a simulator to verify the applicability of our approach in different scenarios.