Technical report on the Content Rating and Fake Detection System
نویسندگان
چکیده
The goal of our content rating and fake detection system is to automatically detect files having paedophile or pornographic content in a P2P system. It evaluates the content of a file using user preferences, the idea being that if a given user is interested in two files, this means that these files are somewhat related. Based on this idea, we build a graph of common interest between files and extract a hierarchical community structure from it, grouping together similar files. Starting from a file list initially considered as paedophile or pornographic, this method characterises all files that are similar to the ones from the initial list, i.e. files with paedophile or pornographic content. In this report, we present the method we implemented and assess the quality of results using various complementary approaches.
منابع مشابه
Content Rating and Fake Detection system
We present here the web-interface we designed and implemented to make it easier to access our data on P2P activity. In particular, this interface makes it browsable by browsing from files to related users, and conversely. Moreover, we include in this interface richer information which we precompute, like lists of files of interest for a given user, list of users providing a given file, list of ...
متن کاملDatabase Specification and Access
In this report we present the web interface we designed and implemented to make our data on P2P activity more accessible. In particular, this interface makes data browsable from files to related users, and conversely. Moreover, this interface was enriched with precomputed information, like lists of files of interest for a given user, list of users providing a given file, list of queries entered...
متن کاملDetection of Fake Accounts in Social Networks Based on One Class Classification
Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ similarities considering the network communications of the users. In the first step, similarity ...
متن کاملMeasurement and Analysis of P2P Activity Against Paedophile Content
Peer-to-peer (P2P) systems are nowadays widely used to exchange files, and it is acknowledged that they host much paedophile activity. However, current knowledge of this specific activity remains very limited, and almost no tool exist for user protection. Likewise, tools and knowledge for policy making and law enforcement are far from sufficient. The goal of the Measurement and Analysis of P2P ...
متن کاملImplementation of ROCOPS Method for Anti-Islanding Protection of Wind Turbine
In recent years, based on the growing importance of clean energy in comparison with conventional energy production from fossil fuels, DG systems are gradually becoming more popular all over the world. These resources solve many problem of system. However, these resources create some other problems too. One of the most problem of DGs is unwanted islanding. This paper addresses reliable passive i...
متن کامل