A survey and comparison of peer-to-peer overlay network schemes

EK Lua, J Crowcroft, M Pias… - … Surveys & Tutorials, 2005 - ieeexplore.ieee.org
Over the Internet today, computing and communications environments are significantly more
complex and chaotic than classical distributed systems, lacking any centralized organization …

A survey of emerging approaches to spam filtering

G Caruana, M Li - ACM computing surveys (CSUR), 2008 - dl.acm.org
From just an annoying characteristic of the electronic mail epoch, spam has evolved into an
expensive resource and time-consuming problem. In this survey, we focus on emerging …

Detecting and characterizing social spam campaigns

H Gao, J Hu, C Wilson, Z Li, Y Chen… - Proceedings of the 10th …, 2010 - dl.acm.org
Online social networks (OSNs) are popular collaboration and communication tools for
millions of users and their friends. Unfortunately, in the wrong hands, they are also effective …

Tapestry: A resilient global-scale overlay for service deployment

BY Zhao, L Huang, J Stribling, SC Rhea… - IEEE Journal on …, 2004 - ieeexplore.ieee.org
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable,
location-independent routing of messages directly to nearby copies of an object or service …

A survey of learning-based techniques of email spam filtering

E Blanzieri, A Bryl - Artificial Intelligence Review, 2008 - Springer
Email spam is one of the major problems of the today's Internet, bringing financial damage to
companies and annoying individual users. Among the approaches developed to stop spam …

Dynamic message filtering

S Loughmiller, M Olson, J Ready, E Maedge… - US Patent …, 2007 - Google Patents
US7257564B2 - Dynamic message filtering - Google Patents US7257564B2 - Dynamic
message filtering - Google Patents Dynamic message filtering Download PDF Info …

Blacklight: Scalable defense for neural networks against {Query-Based}{Black-Box} attacks

H Li, S Shan, E Wenger, J Zhang, H Zheng… - 31st USENIX Security …, 2022 - usenix.org
Deep learning systems are known to be vulnerable to adversarial examples. In particular,
query-based black-box attacks do not require knowledge of the deep learning model, but …

[PDF][PDF] An Open Digest-based Technique for Spam Detection.

E Damiani, SDC Di Vimercati, S Paraboschi… - PDCS, 2004 - Citeseer
A promising anti-spam technique consists in collecting users opinions that given email
messages are spam and using this collective judgment to block message propagation to …

The design of fast and lightweight resemblance detection for efficient post-deduplication delta compression

W Xia, L Pu, X Zou, P Shilane, S Li, H Zhang… - ACM Transactions on …, 2023 - dl.acm.org
Post-deduplication delta compression is a data reduction technique that calculates and
stores the differences of very similar but non-duplicate chunks in storage systems, which is …

Characterizing a spam traffic

LH Gomes, C Cazita, JM Almeida, V Almeida… - Proceedings of the 4th …, 2004 - dl.acm.org
The rapid increase in the volume of unsolicited commercial e-mails, also known as spam, is
beginning to take its toll in system administrators, business corporations and end-users …