{"id":"https://openalex.org/W2009000502","doi":"https://doi.org/10.1145/1458082.1458357","title":"A spam resistant family of concavo-convex ranks for link analysis","display_name":"A spam resistant family of concavo-convex ranks for link analysis","publication_year":2008,"publication_date":"2008-10-26","ids":{"openalex":"https://openalex.org/W2009000502","doi":"https://doi.org/10.1145/1458082.1458357","mag":"2009000502"},"language":"en","primary_location":{"id":"doi:10.1145/1458082.1458357","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1458082.1458357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Information and knowledge management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108351571","display_name":"Sreangsu Acharyya","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sreangsu Acharyya","raw_affiliation_strings":["University of Texas Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103071668","display_name":"Joydeep Ghosh","orcid":"https://orcid.org/0000-0002-7366-3548"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joydeep Ghosh","raw_affiliation_strings":["University of Texas Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108351571"],"corresponding_institution_ids":["https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10498908,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1505","last_page":"1506"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pagerank","display_name":"PageRank","score":0.7286581993103027},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6560043096542358},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.5951194167137146},{"id":"https://openalex.org/keywords/link","display_name":"Link (geometry)","score":0.5891172289848328},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5089786052703857},{"id":"https://openalex.org/keywords/parameterized-complexity","display_name":"Parameterized complexity","score":0.5052533745765686},{"id":"https://openalex.org/keywords/link-analysis","display_name":"Link analysis","score":0.4976387321949005},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4353097379207611},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.41443198919296265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2591584324836731},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24799063801765442},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19731315970420837},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.16259950399398804},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1182151734828949}],"concepts":[{"id":"https://openalex.org/C2779172887","wikidata":"https://www.wikidata.org/wiki/Q184316","display_name":"PageRank","level":2,"score":0.7286581993103027},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6560043096542358},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.5951194167137146},{"id":"https://openalex.org/C2778753846","wikidata":"https://www.wikidata.org/wiki/Q6554239","display_name":"Link (geometry)","level":2,"score":0.5891172289848328},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5089786052703857},{"id":"https://openalex.org/C165464430","wikidata":"https://www.wikidata.org/wiki/Q1570441","display_name":"Parameterized complexity","level":2,"score":0.5052533745765686},{"id":"https://openalex.org/C1173588","wikidata":"https://www.wikidata.org/wiki/Q6554294","display_name":"Link analysis","level":2,"score":0.4976387321949005},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4353097379207611},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.41443198919296265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2591584324836731},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24799063801765442},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19731315970420837},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.16259950399398804},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1182151734828949},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1458082.1458357","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1458082.1458357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Information and knowledge management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1600537614","https://openalex.org/W1845137714","https://openalex.org/W6638958490"],"related_works":["https://openalex.org/W2380760159","https://openalex.org/W329034363","https://openalex.org/W2305543783","https://openalex.org/W2963128065","https://openalex.org/W3141404487","https://openalex.org/W2486657487","https://openalex.org/W2900609923","https://openalex.org/W2583864867","https://openalex.org/W1558012608","https://openalex.org/W2532922894"],"abstract_inverted_index":{"A":[0,34],"parameterized":[1],"family":[2,63],"of":[3,23,36,42,75,98,102],"non-linear,":[4],"link":[5,31,103],"analytic":[6],"ranking":[7],"functions":[8,25],"is":[9,39],"proposed":[10,84],"that":[11,56,72],"includes":[12],"Pagerank":[13],"as":[14],"a":[15,44,80],"special":[16],"case":[17],"and":[18,49],"uses":[19,73],"the":[20,37,40,99],"convexity":[21],"property":[22],"those":[24],"to":[26,30,69,91,95],"be":[27],"more":[28],"resistant":[29],"spam":[32,66,76,104],"attacks.":[33],"contribution":[35],"paper":[38,53],"construction":[41],"such":[43],"scheme":[45],"with":[46],"provable":[47],"uniqueness":[48],"convergence":[50],"guarantees.":[51],"The":[52,83],"also":[54],"demonstrates":[55],"even":[57],"in":[58],"an":[59],"unlabelled":[60],"scenario":[61],"this":[62],"can":[64,86],"have":[65],"resistance":[67],"comparable":[68],"Trustrank":[70],"[3]":[71],"labels":[74],"or":[77],"nat-spam":[78],"on":[79],"training":[81],"set.":[82],"method":[85],"use":[87],"labels,":[88],"if":[89],"available,":[90],"improve":[92],"its":[93],"performance":[94],"provide":[96],"state":[97],"art":[100],"level":[101],"protection.":[105]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
