Overcoming Spammers in Twitter -- A Tale of Five Algorithms
Autor(es) y otros:
Palabra(s) clave:
Social Networks
Twitte
Spamming
Graph Centrslity
Prestige
Fecha de publicación:
Editorial:
CERI
Resumen:
Micro-blogging services such as Twitter can develop into valuable sources of up-to-date information provided the spam problem is overcome. Thus, separating the most relevant users from the spammers is a highly pertinent question for which graph centrality methods can provide an answer. In this paper we examine the vulnerability of five different algorithms to linking malpractice in Twitter and propose a first step towards ―desensitizing‖ them against such abusive behavior.
Micro-blogging services such as Twitter can develop into valuable sources of up-to-date information provided the spam problem is overcome. Thus, separating the most relevant users from the spammers is a highly pertinent question for which graph centrality methods can provide an answer. In this paper we examine the vulnerability of five different algorithms to linking malpractice in Twitter and propose a first step towards ―desensitizing‖ them against such abusive behavior.
Descripción:
I Congreso Español de Recuperación de la Información, Madrid, 2010
Colecciones
- Informática [789]
- Ponencias, Discursos y Conferencias [4045]