Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 1457870, 9 pages
https://doi.org/10.1155/2017/1457870
Research Article

CPSFS: A Credible Personalized Spam Filtering Scheme by Crowdsourcing

1College of Computer & Communication Engineering China University of Petroleum (East China), Qingdao, China
2University of Oulu, Oulu, Finland

Correspondence should be addressed to Xin Liu; nc.ude.cpu@xl

Received 12 September 2017; Accepted 5 December 2017; Published 27 December 2017

Academic Editor: Kuan Zhang

Copyright © 2017 Xin Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Miller, B. Dickinson, W. Deitrick, W. Hu, and A. H. Wang, “Twitter spammer detection using data stream clustering,” Information Sciences, vol. 260, pp. 64–73, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Shen, R. H. Deng, Z. Cheng, L. Nie, and S. Yan, “On robust image spam filtering via comprehensive visual modeling,” Pattern Recognition, vol. 48, no. 10, pp. 3227–3238, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. B. Cui, Z. Liu, and L. Wang, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage,” IEEE Transactions on Computers, vol. 65, no. 8, pp. 2374–2385, 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. Z. Liu, X. Chen, J. Yang, C. Jia, and I. You, “New order preserving encryption model for outsourced databases in cloud environments,” Journal of Network and Computer Applications, vol. 59, pp. 198–207, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. China Internet Association Anti-Spam center: Anti-spam survey report, http://www.acma.gov.au/theACMA/spam-statistics.
  6. Y.-M. Li, H.-W. Hsiao, and Y.-L. Lee, “Recommending social network applications via social filtering mechanisms,” Information Sciences, vol. 239, pp. 18–30, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. W. Mason, J. W. Vaughan, and H. Wallach, “Computational social science and social computing,” Machine Learning, vol. 95, no. 3, pp. 257–260, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. Y. Ren and D. Ji, “Neural networks for deceptive opinion spam detection: An empirical study,” Information Sciences, vol. 385-386, pp. 213–224, 2017. View at Publisher · View at Google Scholar · View at Scopus
  9. H. Shen, Z. Li, J. Liu, and J. E. Grant, “Knowledge sharing in the online social network of Yahoo! Answers and its implications,” IEEE Transactions on Computers, vol. 64, no. 6, pp. 1715–1728, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317–323, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Quinn, L. Chen, and M. Mulvenna, “Social network analysis: A survey,” International Journal of Ambient Computing and Intelligence, vol. 4, no. 3, pp. 46–58, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. A. Kim and M. A. Ahmad, “Trust, distrust and lack of confidence of users in online social media-sharing communities,” Knowledge-Based Systems, vol. 37, pp. 438–450, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. S. J. Yu, “The dynamic competitive recommendation algorithm in social network services,” Information Sciences, vol. 187, no. 1, pp. 1–14, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Liu, X. Li, Y. Ding et al., “A social network-based trust-aware propagation model for P2P systems,” Knowledge-Based Systems, vol. 41, pp. 8–15, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Liu, L. Shi, Y. Wang, Z. Xin, and W. Fu, “A dynamic trust conference algorithm for social network,” in Proceedings of the 2013 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2013, pp. 340–346, France, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. X. Liu, Y. Wang, D. Zhao, W. Zhang, and L. Shi, “Patching by automatically tending to hub nodes based on social trust,” Computer Standards & Interfaces, vol. 44, pp. 94–101, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Jaeyeon and S. Emil, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proceedings of the 4th ACM SIGCOMM Conference on Internet measurement, pp. 370–375, October 2004.
  18. C. O'Brien and C. Vogel, “Spam filters: Bayes vs. Chi-squared; letters vs,” in Proceedings of the in Proceedings of the 1st International Symposium on Information and Communication Technologies, pp. 291–296, September 2003.
  19. P. Haider, U. Brefeld, and T. Scheffer, “Supervised clustering of streaming data for email batch detection,” in Proceedings of the 24th International Conference on Machine Learning, ICML 2007, pp. 345–352, USA, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Scholkopf and J. B. Platt, “Dirichlet-Enhanced spam filtering based on biased samples,” in Proceedings of the International Conference on Neural Information Processing Systems, pp. 161–168, MIT Press, January 2006.
  21. D. Zisiadis, S. Kopsidas, A. Varalis, and L. Tassiulas, “Mailbook: A social network against spamming,” in Proceedings of the 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011, pp. 245–249, are, December 2011. View at Scopus
  22. P. O. Boykin and V. P. Roychowdhury, “Leveraging social networks to fight spam,” The Computer Journal, vol. 38, no. 4, pp. 61–68, 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. M. Sirivianos, K. Kim, and X. Yang, “SocialFilter: Introducing social trust to collaborative spam mitigation,” in Proceedings of the IEEE INFOCOM 2011, pp. 2300–2308, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Shen and Z. Li, “Leveraging social networks for effective spam filtering,” IEEE Transactions on Computers, vol. 63, no. 11, pp. 2743–2759, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao, “User interactions in social networks and their implications,” in Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys'09, pp. 205–218, Germany, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Kobayakawa, S. Kinjo, M. Hoshi, T. Ohmori, and A. Yamamoto, “Fast computation of similarity based on jaccard coefficient for composition-based image retrieval,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 5879, pp. 949–955, 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. Z. Li and H. Shen, “SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box,” in Proceedings of the IEEE INFOCOM 2011, pp. 1835–1843, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. Z. Zhong and K. Li, “Speed up statistical spam filter by approximation,” IEEE Transactions on Computers, vol. 60, no. 1, pp. 120–134, 2010. View at Publisher · View at Google Scholar · View at Scopus
  29. S. Hameed, X. Fu, P. Hui, and N. Sastry, “LENS: Leveraging social networking and trust to prevent spam transmission,” in Proceedings of the 19th IEEE International Conference on Network Protocols, ICNP 2011, pp. 13–18, Canada, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  30. Datatang., http://www.datatang.com/data/796.
  31. “Spam Assassin,” http://spamassassin.apache.org/downloads.cgi?update=201504291720/.
  32. Z. Ning, L. Liu, F. Xia, B. Jedari, I. Lee, and W. Zhang, “CAIS: a copy adjustable incentive scheme in community-based socially aware networking,” IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3406–3419, 2017. View at Publisher · View at Google Scholar
  33. Z. Ning, F. Xia, X. Hu, Z. Chen, and M. S. Obaidat, “Social-oriented adaptive transmission in opportunistic internet of smartphones,” IEEE Transactions on Industrial Informatics, vol. 13, no. 2, pp. 810–820, 2017. View at Publisher · View at Google Scholar
  34. Z. Ning, F. Xia, N. Ullah, X. Kong, and X. Hu, “Vehicular Social Networks: Enabling Smart Mobility,” IEEE Communications Magazine, vol. 55, no. 5, pp. 16–55, 2017. View at Publisher · View at Google Scholar