G Caruana, M Li - ACM computing surveys (CSUR), 2008 - dl.acm.org
From just an annoying characteristic of the electronic mail epoch, spam has evolved into an expensive resource and time-consuming problem. In this survey, we focus on emerging …
H Gao, J Hu, C Wilson, Z Li, Y Chen… - Proceedings of the 10th …, 2010 - dl.acm.org
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective …
BY Zhao, L Huang, J Stribling, SC Rhea… - IEEE Journal on …, 2004 - ieeexplore.ieee.org
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable, location-independent routing of messages directly to nearby copies of an object or service …
E Blanzieri, A Bryl - Artificial Intelligence Review, 2008 - Springer
Email spam is one of the major problems of the today's Internet, bringing financial damage to companies and annoying individual users. Among the approaches developed to stop spam …
Deep learning systems are known to be vulnerable to adversarial examples. In particular, query-based black-box attacks do not require knowledge of the deep learning model, but …
A promising anti-spam technique consists in collecting users opinions that given email messages are spam and using this collective judgment to block message propagation to …
W Xia, L Pu, X Zou, P Shilane, S Li, H Zhang… - ACM Transactions on …, 2023 - dl.acm.org
Post-deduplication delta compression is a data reduction technique that calculates and stores the differences of very similar but non-duplicate chunks in storage systems, which is …
LH Gomes, C Cazita, JM Almeida, V Almeida… - Proceedings of the 4th …, 2004 - dl.acm.org
The rapid increase in the volume of unsolicited commercial e-mails, also known as spam, is beginning to take its toll in system administrators, business corporations and end-users …