Steve Webb

According to our database1, Steve Webb authored at least 31 papers between 1995 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Detecting malicious campaigns in crowdsourcing platforms.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Characterizing and automatically detecting crowdturfing in Fiverr and Twitter.
Social Netw. Analys. Mining, 2015

2014
The Dark Side of Micro-Task Marketplaces: Characterizing Fiverr and Automatically Detecting Crowdturfing.
Proceedings of the Eighth International Conference on Weblogs and Social Media, 2014

2011
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks.
IEEE Internet Computing, 2011

2010
The SocialTrust framework for trusted social information management: Architecture and algorithms.
Inf. Sci., 2010

The social honeypot project: protecting online communities from spammers.
Proceedings of the 19th International Conference on World Wide Web, 2010

Uncovering social spammers: social honeypots + machine learning.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Study of Static Classification of Social Spam Profiles in MySpace.
Proceedings of the Fourth International Conference on Weblogs and Social Media, 2010

Using a Bayesian Feature-selection Algorithm to Identify Dose-response Models Based on the Shape of the 3D Dose-distribution: An Example from a Head-and-neck Cancer Trial.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

A Summary of Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

2009
Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities.
Proceedings of the Encyclopedia of Complexity and Systems Science, 2009

A Parameterized Approach to Spam-Resilient Link Analysis of the Web.
IEEE Trans. Parallel Distrib. Syst., 2009

Using Bayesian Logistic Regression with High-Order Interactions to Model Radiation-Induced Toxicities Following Radiotherapy.
Proceedings of the International Conference on Machine Learning and Applications, 2009

Large Online Social Footprints - An Emerging Threat.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Towards robust trust establishment in web-based social networks with socialtrust.
Proceedings of the 17th International Conference on World Wide Web, 2008

Socialtrust: tamper-resilient trust establishment in online communities.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2008

A Large-Scale Study of MySpace: Observations and Implications for Online Social Networks.
Proceedings of the Second International Conference on Weblogs and Social Media, 2008

Evolutionary study of phishing.
Proceedings of the 2008 eCrime Researchers Summit, 2008

Predicting web spam with HTTP session information.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

Social Honeypots: Making Friends With A Spammer Near You.
Proceedings of the CEAS 2008, 2008

2007
Spam-Resilient Web Rankings via Influence Throttling.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Characterizing Web Spam Using Content and HTTP Session Analysis.
Proceedings of the CEAS 2007, 2007

A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification.
Proceedings of the CEAS 2007, 2007

2006
Towards the integration of diverse spam filtering techniques.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Introducing the Webb Spam Corpus: Using Email Spam to Identify Web Spam Automatically.
Proceedings of the CEAS 2006, 2006

Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution.
Proceedings of the CEAS 2006, 2006

2005
An experimental evaluation of spam filter performance and robustness against attack.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

2004
Analysis of state exposure control to prevent cheating in online games.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2004

2000
Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age.
Comput. Secur., 2000

1996
A prototype rotating slat collimator for single photon emission computed tomography.
IEEE Trans. Med. Imaging, 1996

1995
Optimizing radiation therapy inverse treatment planning using the simulated annealing technique.
Int. J. Imaging Systems and Technology, 1995


  Loading...