Overcoming Spammers in Twitter -- A Tale of Five Algorithms
Subject:
Social Networks
Twitte
Spamming
Graph Centrslity
Prestige
Publication date:
Editorial:
CERI
Abstract:
Micro-blogging services such as Twitter can develop into valuable sources of up-to-date information provided the spam problem is overcome. Thus, separating the most relevant users from the spammers is a highly pertinent question for which graph centrality methods can provide an answer. In this paper we examine the vulnerability of five different algorithms to linking malpractice in Twitter and propose a first step towards ―desensitizing‖ them against such abusive behavior.
Micro-blogging services such as Twitter can develop into valuable sources of up-to-date information provided the spam problem is overcome. Thus, separating the most relevant users from the spammers is a highly pertinent question for which graph centrality methods can provide an answer. In this paper we examine the vulnerability of five different algorithms to linking malpractice in Twitter and propose a first step towards ―desensitizing‖ them against such abusive behavior.
Description:
I Congreso Español de Recuperación de la Información, Madrid, 2010
Collections
- Informática [777]
- Ponencias, Discursos y Conferencias [4018]