30:
related to strategies for working with a data source where some portion of it has been manipulated maliciously. Tasks can include gathering, indexing, filtering, retrieving and ranking information from such a data source. Adversarial IR includes the study of methods to detect, isolate, and defeat
252:
209:
267:
314:
298:
47:
239:
197:
38:(also known as spamdexing), which involves employing various techniques to disrupt the activity of
319:
214:
71:
27:
8:
59:
39:
145:
75:
264:
161:
95:
63:
253:
SIGIR Worksheet Report: Adversarial
Information Retrieval on the Web (AIRWeb 2006)
271:
167:
308:
189:
134:
109:
51:
177:
172:
156:
150:
188:
The term "adversarial information retrieval" was first coined in 2000 by
127:
67:
43:
219:
193:
35:
289:: series of workshops on Adversarial Information Retrieval on the Web
113:
90:
55:
100:
138:
286:
117:
265:
Very Large Scale
Retrieval and Web Search (Preprint version)
292:
42:, usually for financial gain. Examples of spamdexing are
34:
On the Web, the predominant form of such manipulation is
295:: competition for researchers on Web Spam Detection
306:
251:B. Davison, M. Najork, and T. Converse (2006),
301:: datasets for research on Web Spam Detection
74:may also be considered forms of adversarial
16:Information retrieval strategies in datasets
210:Artificial intelligence content detection
86:Topics related to Web spam (spamdexing):
196:) during the Web plenary session at the
307:
263:D. Hawking and N. Craswell (2004),
13:
14:
331:
280:
108:Spam related to blogs, including
20:Adversarial information retrieval
166:Malicious tagging or voting in
257:
245:
242:. IEEE Computer. 40(7), 85-86.
232:
58:(splogs), malicious tagging.
1:
225:
315:Information retrieval genres
7:
203:
10:
336:
183:
192:(then Chief Scientist at
81:
133:Reverse engineering of
151:Advertisement blocking
36:search engine spamming
238:Jansen, B. J. (2007)
215:Information retrieval
72:web content filtering
28:information retrieval
60:Reverse engineering
31:such manipulation.
293:Web Spam Challenge
270:2007-08-29 at the
64:ranking algorithms
40:web search engines
299:Web Spam Datasets
146:content filtering
105:Malicious tagging
76:data manipulation
327:
274:
261:
255:
249:
243:
236:
162:Troll (Internet)
96:Keyword spamming
26:) is a topic in
335:
334:
330:
329:
328:
326:
325:
324:
305:
304:
283:
278:
277:
272:Wayback Machine
262:
258:
250:
246:
237:
233:
228:
206:
200:-9 conference.
186:
168:social networks
84:
17:
12:
11:
5:
333:
323:
322:
320:Internet fraud
317:
303:
302:
296:
290:
282:
281:External links
279:
276:
275:
256:
244:
230:
229:
227:
224:
223:
222:
217:
212:
205:
202:
185:
182:
181:
180:
175:
170:
164:
159:
153:
148:
142:
131:
123:Other topics:
121:
120:
106:
103:
98:
93:
83:
80:
24:adversarial IR
15:
9:
6:
4:
3:
2:
332:
321:
318:
316:
313:
312:
310:
300:
297:
294:
291:
288:
285:
284:
273:
269:
266:
260:
254:
248:
241:
235:
231:
221:
218:
216:
213:
211:
208:
207:
201:
199:
195:
191:
190:Andrei Broder
179:
176:
174:
171:
169:
165:
163:
160:
158:
154:
152:
149:
147:
143:
140:
136:
135:search engine
132:
129:
126:
125:
124:
119:
115:
111:
107:
104:
102:
99:
97:
94:
92:
89:
88:
87:
79:
77:
73:
69:
65:
61:
57:
53:
52:referrer spam
49:
45:
41:
37:
32:
29:
25:
21:
259:
247:
234:
187:
178:Sockpuppetry
173:Astroturfing
122:
110:comment spam
85:
44:link-bombing
33:
23:
19:
18:
240:Click fraud
128:Click fraud
68:click fraud
309:Categories
226:References
220:Spamdexing
194:Alta Vista
56:spam blogs
141:algorithm
130:detection
118:ping spam
91:Link spam
268:Archived
204:See also
157:crawling
155:Stealth
101:Cloaking
184:History
139:ranking
48:comment
287:AIRWeb
116:, and
114:splogs
82:Topics
70:, and
198:TREC
144:Web
137:'s
62:of
50:or
311::
112:,
78:.
66:,
54:,
46:,
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.