Search For:

Displaying 1-12 out of 12 total
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks
Found in: IEEE Internet Computing
By Danesh Irani, Steve Webb, Calton Pu, Kang Li
Issue Date:May 2011
pp. 13-19
<p>Most people have multiple accounts on different social networks. Because these networks offer various levels of privacy protection, the weakest privacy policies in the social network ecosystem determine how much personal information is disclosed o...
Using a Bayesian Feature-selection Algorithm to Identify Dose-response Models Based on the Shape of the 3D Dose-distribution: An Example from a Head-and-neck Cancer Trial
Found in: Machine Learning and Applications, Fourth International Conference on
By Florian Buettner, Sarah L. Gulliford, Steve Webb, Mike Partridge, Aisha B. Miah, Kevin J. Harrington, Christopher M. Nutting
Issue Date:December 2010
pp. 740-745
A reduction in salivary flow and xerostomia are common side-effects after radiotherapy of head and neck tumours. Xerostomia can be modeled based on the dose to the parotid glands. To date, all spatial information has been discarded and dose-response models...
A Summary of Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities
Found in: Granular Computing, IEEE International Conference on
By Steve Webb, James Caverlee, Calton Pu
Issue Date:August 2010
pp. 39-40
Online social networking communities are connecting hundreds of millions of individuals across the globe and facilitating new modes of interaction. Due to their immense popularity, an important question is whether these communities are safe for their users...
Using Bayesian Logistic Regression with High-Order Interactions to Model Radiation-Induced Toxicities Following Radiotherapy
Found in: Machine Learning and Applications, Fourth International Conference on
By Florian Buettner, Sarah Gulliford, Steve Webb, Mike Partridge
Issue Date:December 2009
pp. 451-456
Radiotherapy treatments of cancer patients are planned using dose-volume constraints. These constraints limit the volume of organs receiving a given threshold dose. We propose a new framework to predict radiation-induced toxicities and evaluate dosimetric ...
Large Online Social Footprints--An Emerging Threat
Found in: Computational Science and Engineering, IEEE International Conference on
By Danesh Irani, Steve Webb, Kang Li, Calton Pu
Issue Date:August 2009
pp. 271-276
We study large online social footprints by collecting data on 13,990 active users. After parsing data from 10 of the 15 most popular social networking sites, we find that a user with one social network reveals an average of 4.3 personal information fields....
A Parameterized Approach to Spam-Resilient Link Analysis of the Web
Found in: IEEE Transactions on Parallel and Distributed Systems
By James Caverlee, Steve Webb, Ling Liu, William B. Rouse
Issue Date:October 2009
pp. 1422-1438
Link-based analysis of the Web provides the basis for many important applications—like Web search, Web-based data mining, and Web page categorization—that bring order to the massive amount of distributed Web content. Due to the overwhelming reliance on the...
Spam-Resilient Web Rankings via Influence Throttling
Found in: Parallel and Distributed Processing Symposium, International
By James Caverlee, Steve Webb, Ling Liu
Issue Date:March 2007
pp. 43
Web search is one of the most critical applications for managing the massive amount of distributed Web content. Due to the overwhelming reliance on Web search, there is a rise in efforts to manipulate (or spam) Web search engines. In this paper, we develop...
Uncovering social spammers: social honeypots + machine learning
Found in: Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval (SIGIR '10)
By James Caverlee, Kyumin Lee, Steve Webb
Issue Date:July 2010
pp. 435-442
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advertising are threatened by spammers, content polluters, and malware disseminator...
Predicting web spam with HTTP session information
Found in: Proceeding of the 17th ACM conference on Information and knowledge mining (CIKM '08)
By Calton Pu, James Caverlee, Steve Webb
Issue Date:October 2008
pp. 1001-1001
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expose users to dangerous Web-borne malware. To defend against Web spam, most prev...
Socialtrust: tamper-resilient trust establishment in online communities
Found in: Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries (JCDL '08)
By James Caverlee, Ling Liu, Steve Webb
Issue Date:June 2008
pp. 597-617
Web 2.0 promises rich opportunities for information sharing, electronic commerce, and new modes of social interaction, all centered around the "social Web" of user-contributed content, social annotations, and person-to-person social connections. But the in...
Towards robust trust establishment in web-based social networks with socialtrust
Found in: Proceeding of the 17th international conference on World Wide Web (WWW '08)
By James Caverlee, Ling Liu, Steve Webb
Issue Date:April 2008
pp. 1-7
We propose the SocialTrust framework for tamper-resilient trust establishment in online social networks. Two of the salient features of SocialTrust are its dynamic revision of trust by (i) distinguishing relationship quality from trust; and (ii) incorporat...
Analysis of state exposure control to prevent cheating in online games
Found in: Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video (NOSSDAV '04)
By Doug McCreary, Kang Li, Shanshan Ding, Steve Webb
Issue Date:June 2004
pp. 140-145
Cheating has become a serious threat to the online game industry. One common type of cheating is accessing game states that are not supposed to be exposed to the players. In this paper, we evaluate a few information dissemination strategies that limit the ...