Abstract
Tracing the tangled web of unsolicited and undesired email and possible strategies for its demise.
- Adler, B., Alfaro, L.D. and Pye, I. Detecting Wikipedia vandalism using wikitrust. Notebook papers of CLEF 1 (2010), 22--23.Google Scholar
- Allem, J.P., Ferrara, E., Uppu, S.P., Cruz, T.B. and Unger, J.B. E-cigarette surveillance with social media data: social bots, emerging topics, and trends. JMIR Public Health and Surveillance 3, 4 (2017).Google ScholarCross Ref
- Almeida, T.A., Hidalgo, J.M.G. and Yamakami, A. Contributions to the study of SMS spam filtering: new collection and results. In Proceedings of the 11<sup>th</sup> ACM Symposium on Document Engineering. ACM, 2011, 259--262. Google ScholarDigital Library
- Androutsopoulos, I., Koutsias, J., Chandrinos, K.V. and Spyropoulos, C.D. An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In Proceedings of the ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 2000, 160--167. Google ScholarDigital Library
- Baeza-Yates, R. Bias on the Web. Commun. ACM 61, 6 (June 2018), 54--61. Google ScholarDigital Library
- Bessi, A. and Ferrara, E. Social bots distort the 2016 US Presidential election online discussion. First Monday 21, 11 (2016).Google ScholarCross Ref
- Caruana, G. and Li, M. A survey of emerging approaches to spam filtering. ACM Computing Surveys 44, 2 (2012), 9. Google ScholarDigital Library
- Chesney, R. and Citron, D. Deep Fakes: A Looming Crisis for National Security, Democracy and Privacy. The Lawfare Blog (2018).Google Scholar
- Chhabra, S., Aggarwal, A., Benevenuto, F. and Kumaraguru, P. Phi.sh/Social: The phishing landscape through short URLs. In Proceedings of the 8<sup>th</sup> Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. ACM, 2011, 92--101. Google ScholarDigital Library
- Cranor, L.F. and LaMacchia, B.A. Spam! Commun. ACM 41, 8 (Aug. 1998), 74--83. Google ScholarDigital Library
- Crawford, M., Khoshgoftaar, T.M., Prusa, J.D., Richter, A.D. and Najada, H.A. Survey of review spam detection using machine-learning techniques. J. Big Data 2, 1 (2015), 23.Google ScholarCross Ref
- De Meo, P., Ferrara, E., Fiumara, G. and Provetti, A. On Facebook, most ties are weak. Commun, ACM 57, 11 (Nov. 2014), 78--84. Google ScholarDigital Library
- Drucker, H., Wu, D. and Vapnik, V.N. Support vector machines for spam categorization. IEEE Trans Neural Networks 10 (1999). Google ScholarDigital Library
- Eykholt, K. et al. D. Robust physical-world attacks on deep learning visual classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, 1625--1634.Google ScholarCross Ref
- Ferrara, E. Manipulation and abuse on social media. ACM SIGWEB Newsletter Spring (2015), 4. Google ScholarDigital Library
- Ferrara, E., Varol, O., Davis, C., Menczer, F. and Flammini, A. The rise of social bots. Commun. ACM 59, 7 (July 2016), 96--104. Google ScholarDigital Library
- Fumera, G., Pillai, I. and Roli, F. Spam filtering based on the analysis of text information embedded into images. J. Machine Learning Research 7, (Dec. 2006), 2699--2720. Google ScholarDigital Library
- Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y. and Zhao, B.Y. Detecting and characterizing social spam campaigns. In Proceedings of the 10<sup>th</sup> ACM SIGCOMM Conference on Internet Measurement. ACM, 2010, 35--47. Google ScholarDigital Library
- Ghosh, S. et al. Understanding and combating link farming in the Twitter social network. In Proceedings of the 21<sup>st</sup> International Conference on World Wide Web. ACM, 2012, 61--70. Google ScholarDigital Library
- Goodman, J., Cormack, G.V. and Heckerman, D. Spam and the ongoing battle for the inbox. Commun. ACM 50, 2 (Feb. 2007), 24--33. Google ScholarDigital Library
- Gupta, B.B., Tewari, A., Jain, A.K. and Agrawal, D.P. Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications 28, 12 (2017), 3629--3654. Google ScholarDigital Library
- Hendler, J., Shadbolt, N., Hall, W., Berners-Lee, T. and Weitzner, D. Web science: An interdisciplinary approach to understanding the Web. Commun. ACM 51, 7 (July 2008), 60--69. Google ScholarDigital Library
- Jagatic, T.N. Johnson, N.A. Jakobsson, M. and Menczer, F. Social phishing. Commun. ACM 50, 10 (Oct. 2007), 94--100. Google ScholarDigital Library
- Jindal, N. and Liu, B. Opinion spam and analysis. In Proceedings of the 2008 International Conference on Web Search and Data Mining. ACM, 219--230. Google ScholarDigital Library
- Kim, H. et al. Deep Video Portraits. arXiv preprint (2018), arXiv:1805.11714.Google Scholar
- Laurie, B. and Clayton, R. Proof-of-work proves not to work; version 0.2. In Workshop on Economics and Information, Security, 2004.Google Scholar
- Liu B. Sentiment analysis and opinion mining. Synthesis Lectures on Human Language Technologies 5, 1 (2012), 1--167.Google ScholarCross Ref
- Liu, Y. Gummadi, K.P., Krishnamurthy, B. and Mislove, A. Analyzing Facebook privacy settings: User expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. ACM, 61--70. Google ScholarDigital Library
- Mukherjee, A. et al. Spotting opinion spammers using behavioral footprints. In Proceedings of the 19<sup>th</sup> ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2013, 632--640. Google ScholarDigital Library
- Mukherjee, A., Liu, B. and Glance, N. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21<sup>st</sup> International Conference on World Wide Web. ACM, 2012, 191--200. Google ScholarDigital Library
- Spirin, N. and Han, J. 2012. Survey on Web spam detection: Principles and algorithms. ACM SIGKDD Explorations Newsletter 13, 2 (2012), 50--64. Google ScholarDigital Library
- Subrahmanian, V.S. et al. The DARPA Twitter Bot Challenge, Computer 49, 6 (2016), 38--46. Google ScholarDigital Library
- Suwajanakorn, S., Seitz, S.M. and Kemelmacher-Shlizerman, I. Synthesizing Obama: Learning lip sync from audio. ACM Trans Graphics (2017). Google ScholarDigital Library
- Thies, J., Zollhöfer, M., Stamminger, M., Theobalt, C., and Nießner, M. Face2Face: Real-time face capture and reenactment of RGB videos. In Proceedings of Computer Vision and Pattern Recognition. IEEE, 2016.Google ScholarDigital Library
- Varol, O., Ferrara, E., Davis, C., Menczer, F. and Flammini, A. Online human-bot interactions: Detection, estimation, and characterization. In Proceedings of International AAAI Conference on Web and Social Media, 2017.Google Scholar
- Vosoughi, S., Roy, D. and Aral, S. The spread of true and false news online. Science 359, 6380 (2018), 1146--1151.Google ScholarCross Ref
- Wu, C.H. Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Systems with Applications 36, 3 (2009), 4321--4330. Google ScholarDigital Library
- Wu, C.T., Cheng, K.T., Zhu, Q., and Wu, Y.L. Using visual features for anti-spam filtering. In Proceedings of IEEE International Conference on Image Processing 3. IEEE, 2005, III--509.Google Scholar
- Xie, S., Wang, G., Lin, S. and Yu, P.S. Review spam detection via temporal pattern discovery. In Proceedings of the 18<sup>th</sup> ACM SIGKDD international Conference on Knowledge Discovery and Data Mining. ACM, 2012, 823--831. Google ScholarDigital Library
- Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y. and Dai, Y. Uncovering social network Sybils in the wild. ACM Trans. Knowledge Discovery from Data 8, 1 (2014), 2. Google ScholarDigital Library
Index Terms
- The history of digital spam
Recommendations
Spam mitigation using spatio-temporal reputations from blacklist history
ACSAC '10: Proceedings of the 26th Annual Computer Security Applications ConferenceIP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to perform computationally expensive content-based filtering. However, ...
Spam, spam, spam, spam: how can we stop it
CHI EA '03: CHI '03 Extended Abstracts on Human Factors in Computing SystemsHow do we keep our channels of electronic communication, both individual and group, open, while keeping out inappropriate and unrelated materials, such as spam? Does someone other than the intended recipient have the right to control what electronic ...
Comments