|
[1] Instagram on the app store. https://itunes.apple.com/tw/app/instagram/ id389801252?mt=8. [2] Top 15 most popular social networking sites | may 2016. http://www.ebizmba. com/articles/social-networking-websites. [3] An introduction to instagram. https://www.wordtracker.com/academy/ social-media-marketing/facebook-instagram/introduction-toinstagram. [4] 8% of instagram accounts are fakes and 30% are inactive, study says. http://www.businessinsider.com/italian-security-researchersfind-8-percent-of-instagram-accounts-are-fake-2015-7. [5] Instagram deletes millions of accounts in spam purge. http://www.bbc.com/ news/technology-30548463. [6] Instagram swamped with adult-themed fake profiles. http://news. softpedia.com/news/instagram-swamped-with-adult-themed-fakeprofiles-498679.shtml. [7] Hashtagsfor#spammingininstagram, twitter, facebook, tumblr. http://tophashtags.com/hashtag/spamming/. [8] n-gram. https://en.wikipedia.org/wiki/N-gram. [9] Raymond J. Mooney. Cs 388: Natural language processing: N-gram language models. [10] Guang-Hai Liu and Jing-Yu Yang. Content-based image retrieval using color difference histogram. Pattern Recognition, 46(1):188–198, 2013. [11] 1.10. decision trees. http://scikit-learn.org/stable/modules/tree.html. [12] Decision tree learning. https://en.wikipedia.org/wiki/Decision_tree_ learning. [13] Decisiontrees-spark.mllib. http://spark.apache.org/docs/latest/mllibdecision-tree.html. [14] Zhe Wang, William Josephson, Qin Lv, Moses Charikar, and Kai Li. Filtering Image Spam with Near-Duplicate Detection. In Image Rochester NY, 2007. [15] Ngo Phuong Nhung and Tu Minh Phuong. An Efficient Method for Filtering Image-Based Spam. In Research, Innovation and Vision for the Future, 2007 IEEE International Conference, pages 96 – 102, 2007. [16] Sven Krasser, Yuchun Tang, Jeremy Gould, Dmitri Alperovitch, and Paul Judge. Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning. In Proceedings of the 2007 IEEE Workshop on Information Assurance, IAW, number June, pages 255–261, 2007. [17] Francesco Gargiulo and Carlo Sansone. Combining visual and textual features for filtering spam emails. In 2008 19th International Conference on Pattern Recognition, pages 1–4, 2008. [18] Peizhou He, Xiangming Wen, and Wei Zheng. A simple method for filtering image spam. In Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009, pages 910–913, 2009. [19] M.SoranamageswariandC.Meena. AnEfficientFeatureExtractionMethodfor Classification of Image Spam Using Artificial Neural Networks. In Data Storage and Data Engineering (DSDE), 2010 International Conference on, pages 0–3, 2010. [20] Zhen Xu, Hong-guo Wang, and Zeng-zhen Shao. Evaluation of Image Spam Classification System Based on AHP. In 2009 International Conference on Computational Intelligence and Software Engineering, pages 1–4, 2009. [21] Pattaraporn Klangpraphant and Pattarasinee Bhattarakosol. PIMSI: A partial image spam inspector. In 2010 5th International Conference on Future Information Technology, FutureTech 2010 - Proceedings, 2010. [22] Bhaskar Mehta, Saurabh Nangia, Manish Gupta, and Wolfgang Nejdl. Detectingimagespamusingvisualfeaturesandnearduplicatedetection. In Proceeding of the 17th international conference on World Wide Web WWW 08, volume 6, pages 497–506, 2008. [23] Kobkiat Saraubon and Benchaphon Limthanmaphon. Fast effective botnet spam detection. In ICCIT 2009 - 4th International Conference on Computer Sciences and Convergence Information Technology, pages 1066–1070, 2009. [24] Ching-tung Wu, Kwang-ting Cheng, Qiang Zhu, and Yi-leh Wu. Using visual features for anti-spam filtering. In Image Processing, 2005. ICIP 2005. IEEE International Conference on (Volume:3), pages 5–8, 2005. [25] Hrishikesh B. Aradhye, Gregory K. Myers, and James A. Herson. Image analysis for efficient categorization of image-based spam E-mail. In Proceedings of the International Conference on Document Analysis and Recognition, ICDAR, volume 2005, pages 914–918, 2005. [26] Qiao Liu, Zhiguang Qin, Hongrong Cheng, and Mingcheng Wan. Efficient modeling of spam images. In 3rd International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, pages 663–666, 2010. [27] B Byun, C.-H Lee, S Webb, and C Pu. A discriminative classifier learning approach to image modeling and spam image identification. In …. 4th Conference on Email and Anti-Spam, 2007. [28] Yan Gao, Ming Yang, Xiaonan Zhao, Bryan Pardo, Ying Wu, Thrasyvoulos N. Pappas, and Alok Choudhary. Image spam hunter. In ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pages 1765–1768, 2008. [29] Jen Hao Hsia and Ming Syan Chen. Language-model-based detection cascade for efficient classification of image-based spam e-mail. In Proceedings - 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, pages 1182–1185, 2009. [30] Haiqiang Zuo, Xi Li, Ou Wu, Weiming Hu, and Guan Luo. Image spam filtering using Fourier-Mellin invariant features. In ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, number c, pages 849–852, 2009. [31] Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, and Guan Luo. Detecting image spam using local invariant features and pyramid match kernel. In Image Rochester NY, volume 9, pages 1187–1188, 2009. [32] Zhaoyang Qu and Yingjin Zhang. Filtering image spam using image semantics and near-duplicate detection. In 2009 2nd International Conference on Intelligent Computing Technology and Automation, ICICTA 2009, volume 1, pages 600–603, 2009. [33] Giorgio Fumera, Ignazio Pillai, and Fabio Roli. Spam Filtering Based On The Analysis Of Text Information Embedded Into Images. Journal of Machine Learning Research, 7:2699–2720, 2006. [34] Spam and phishing in the q3 of 2014. https://securelist.com/analysis/ quarterly-spam-reports/67851/spam-and-phishing-in-the-q3-of2014/. [35] Battista Biggio, Giorgio Fumera, Ignazio Pillai, and Fabio Roli. A survey and experimental evaluation of image spam filtering techniques. Pattern Recognition Letters, 32(10):1436–1446, 2011. [36] Abdolrahman Attar, Reza Moradi Rad, and Reza Ebrahimi Atani. A Survey of Image Spamming and Filtering Techniques. Artificial Intelligence Review, 40(1):71–105, 2011. [37] Mansour Alsaleh, Abdulrahman Alarifi, Abdul Malik Al-Salman, Mohammed Alfayez, and Abdulmajeed Almuhaysin. TSD: Detecting Sybil Accounts in Twitter. In 2014 13th International Conference on Machine Learning and Applications, pages 463–469, 2014. [38] S Fong, Yan Zhuang, and Jiaying He. Not every friend on a social network can be trusted: Classifying imposters using decision trees. In Future Generation Communication Technology (FGCT), 2012 International Conference on, pages 58–63, 2012. [39] Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS ’14, pages 477–488, 2014. [40] Aditi Gupta, Hemank Lamba, and Ponnurangam Kumaraguru. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. In 2013 APWG eCrime Researchers Summit, pages 1–12, 2013. [41] Surendra Sedhai and Aixin Sun. HSpam14: A Collection of 14 Million Tweets for Hashtag-Oriented Spam Research. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR ’15, pages 223–232, 2015. [42] facebookarchive/python-instagram. https://github.com/facebookarchive/ python-instagram. [43] ekzhu/datasketch. https://github.com/ekzhu/datasketch. [44] Numpy. http://www.numpy.org. [45] scikit-image: Image processing in python. http://scikit-image.org. [46] Introduction to mongodb. https://docs.mongodb.com/manual/ introduction/. [47] Apache spark™ - lightning-fast cluster computing. http://spark.apache.org/. [48] Spark overview. http://spark.apache.org/docs/latest/. [49] docker-mongo-spark. https://github.com/jack482653/docker-mongospark. [50] Json and bson. https://www.mongodb.com/json-and-bson. [51] Instagram rate limits. https://www.instagram.com/developer/limits/. [52] Advanced uses of python decorators. https://www.codementor.io/python/ tutorial/advanced-use-python-decorators-class-function. [53] Stop words. https://en.wikipedia.org/wiki/Stop_words. [54] Spark programming guide. http://spark.apache.org/docs/latest/programming-guide.html. |