DocumentCode :
3781767
Title :
Making Tagging Systems Resistant to Tricky Spam Attacks
Author :
Zhou Li;Cong Tang;Jianbin Hu;Zhong Chen
Author_Institution :
Sch. of EECS, Peking Univ., Beijing, China
fYear :
2015
Firstpage :
871
Lastpage :
879
Abstract :
Tagging systems are known vulnerable to tag spam. While there have been efforts aiming at addressing this problem, tricky spam attackers could exploit and leverage vulnerabilities within them to invalidate these seemingly robust efforts. Rather than fully solving the problem of tricky spam attacks which has been demonstrated almost impossible, this paper aims to mitigate the effect from tricky spam attacks, providing high-quality tag search results to normal users. To achieve this goal, we leverage two key insights exploited from current tagging systems, 1) altruistic users and 2) social networking context, to design a novel reputation-based spam-resistant approach. With our approach, it would be very high probability for normal users to pick their expected content from tag search results, thus decreasing the effect of tag spam. Our experimental results indicate the approach makes at best-effort defense against tricky spam attacks and work better than existing efforts.
Keywords :
"Tagging","Reliability","Flickr","Footwear","Search problems","Recommender systems"
Publisher :
ieee
Conference_Titel :
Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015 IEEE 12th Intl Conf on
Type :
conf
DOI :
10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.169
Filename :
7518348
Link To Document :
بازگشت