Community-based features for identifying spammers in online social networks

SY Bhat, M Abulaish - Proceedings of the 2013 IEEE/ACM international …, 2013 - dl.acm.org
The popularity of Online Social Networks (OSNs) is often faced with challenges of dealing
with undesirable users and their malicious activities in the social networks. The most …

Effective reformulation of query for code search using crowdsourced knowledge and extra-large data analytics

MM Rahman, C Roy - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
Software developers frequently issue generic natural language queries for code search
while using code search engines (eg, GitHub native search, Krugle). Such queries often do …

PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention

A Makkar, N Kumar - Future Generation Computer Systems, 2021 - Elsevier
Image spam is a spamming technique that integrates spam text content into graphical
images in order to bypass conventional text-based spam filters. In order to detect image …

Automated support for unit test generation

A Fontes, G Gay, FG de Oliveira Neto… - Optimising the Software …, 2023 - Springer
Unit testing is a stage of testing where the smallest segment of code that can be tested in
isolation from the rest of the system—often a class—is tested. Unit tests are typically written …

Spam detection in online classified advertisements

H Tran, T Hornbeck, V Ha-Thuc, J Cremer… - Proceedings of the …, 2011 - dl.acm.org
Online classified advertisements have become an essential part of the advertisement
market. Popular online classified advertisement sites such as Craigslist, Ebay Classifieds …

Intelligent Software Maintenance

F Khomh, M Masudur Rahman, A Barbez - Optimising the Software …, 2023 - Springer
Software systems are pervasive in our society. They play a vital role in our everyday life and
are increasingly more and more complex. Software maintenance is one of the most …

[PDF][PDF] Supporting Source Code Search with Context-Aware and Semantics-Driven Query Reformulation

MM Rahman - 2019 - harvest.usask.ca
Software bugs and failures cost trillions of dollars every year, and could even lead to deadly
accidents (eg, Therac-25 accident). During maintenance, software developers fix numerous …

Gamification of Community Policing: SpamCombat

AYK Chua, S Banerjee - … , AMT 2013, Maebashi, Japan, October 29-31 …, 2013 - Springer
The purpose of this paper is two-fold. First, it seeks to introduce the conceptual prototype of
SpamCombat, a Web application that helps combat spam through gamification of community …

Optimal Blade System Design of a New Concept VTOL Vehicle Uusing the Departmental Computing Grid System

JW Park, SH Park, IS Hwang, JJ Moon… - SC'04: Proceedings …, 2004 - ieeexplore.ieee.org
The blade system of a new concept VTOL vehicle is designed utilizing high performance
and Grid computing technologies. The VTOL vehicle called cyclocopter employs a cycloidal …

A re-configuration scheme for social network based large-scale SMS spam

S Jeong, G Noh, H Oh, CK Kim - Journal of KIISE, 2015 - koreascience.kr
Abstract The Short Message Service (SMS) is one of the most popular communication tools
in the world. As the cost of SMS decreases, SMS spam has been growing largely. Even …