• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
Citation: Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.

Research on Countermeasures Against Tag Spam

More Information
  • Published Date: October 14, 2013
  • As one of the most popular Internet applications, it is relatively easy for tagging systems to become the targets of malicious attackers. In a tagging system, malicious users always annotate resources with tag spam for some reason, thereby misleading normal users from searching and sharing those resources. Existing work has already shown that the defense effect of tag spam would directly influence the quality of services provided by tagging systems. Based on this background, through investigating some existing research efforts, this paper gives the formal descriptions of attack styles, and summarizes and extracts the existing three types of methods to defend against tag spam: detection-based method, demotion-based method, and prevention-based method. As to each type of method, this paper further describes corresponding implementing algorithms in detail, and analyzes their advantages and disadvantages, such as efficiency and availability. At the end of this paper, the authors also exhibit the future research directions of defending against tag spam. According to the description of countermeasures against tag spam, this paper can help readers or beginners to get familiar with the situation of this new research field and help researchers to think out more and more novel, practical and effective countermeasures against tag spam.
  • Related Articles

    [1]Liu Linfeng, Yu Zixing, Zhu He. A Link Prediction Method Based on Gated Recurrent Units for Mobile Social Network[J]. Journal of Computer Research and Development, 2023, 60(3): 705-716. DOI: 10.7544/issn1000-1239.202110432
    [2]Jiao Xu, Xiao Yingyuan, Zheng Wenguang, Zhu Ke. Research Progress of Recommendation Technology in Location-Based Social Networks[J]. Journal of Computer Research and Development, 2018, 55(10): 2291-2306. DOI: 10.7544/issn1000-1239.2018.20170489
    [3]Liu Yong, Han Xue, Li Jinbao, Ren Qianqian, Wang Nan. Collaboration Algorithm in Social Networks Based on Tasks with Partial Relation[J]. Journal of Computer Research and Development, 2016, 53(11): 2654-2665. DOI: 10.7544/issn1000-1239.2016.20150617
    [4]Hu Kaixian, Liang Ying, Xu Hongbo, Bi Xiaodi, Zuo Yao. A Method for Social Network User Identity Feature Recognition[J]. Journal of Computer Research and Development, 2016, 53(11): 2630-2644. DOI: 10.7544/issn1000-1239.2016.20150219
    [5]LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341
    [6]Sun Huanliang, Jin Mingyu, Liu Junling, Yu Ge. Methods for Team Formation Problem with Grouping Task in Social Networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2535-2544. DOI: 10.7544/issn1000-1239.2015.20148136
    [7]Lan Mengwei, Li Cuiping, Wang Shaoqing, Zhao Kankan, Lin Zhixia, Zou Benyou, Chen Hong. Survey of Sign Prediction Algorithms in Signed Social Networks[J]. Journal of Computer Research and Development, 2015, 52(2): 410-422. DOI: 10.7544/issn1000-1239.2015.20140210
    [8]Wang Li, Cheng Suqi, Shen Huawei, Cheng Xueqi. Structure Inference and Prediction in the Co-Evolution of Social Networks[J]. Journal of Computer Research and Development, 2013, 50(12): 2492-2503.
    [9]Li Peng, Wang Bin, Shi Zhiwei, Cui Yachao, and Li Hengxun. Tag-TextRank: A Webpage Keyword Extraction Method Based on Tags[J]. Journal of Computer Research and Development, 2012, 49(11): 2344-2351.
    [10]Kang Le, Jing Jiwu, and Wang Yuewu. The Trust Expansion and Control in Social Network Service[J]. Journal of Computer Research and Development, 2010, 47(9): 1611-1621.

Catalog

    Article views (663) PDF downloads (379) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return