{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:08:02Z","timestamp":1745467682228,"version":"3.40.4"},"publisher-location":"London","reference-count":47,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447145547"},{"type":"electronic","value":"9781447145554"}],"license":[{"start":{"date-parts":[[2012,10,13]],"date-time":"2012-10-13T00:00:00Z","timestamp":1350086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,10,13]],"date-time":"2012-10-13T00:00:00Z","timestamp":1350086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4471-4555-4_13","type":"book-chapter","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T17:45:52Z","timestamp":1354643152000},"page":"283-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Geotag Propagation with User Trust Modeling"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Ivanov","sequence":"first","affiliation":[]},{"given":"Peter","family":"Vajda","sequence":"additional","affiliation":[]},{"given":"Jong-Seok","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Korshunov","sequence":"additional","affiliation":[]},{"given":"Touradj","family":"Ebrahimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,13]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/0031-3203(81)90009-1","volume":"13","author":"DH Ballard","year":"1981","unstructured":"Ballard, D.H.: Generalizing the Hough transform to detect arbitrary shapes. Pattern Recogn. 13(2), 111\u2013122 (1981)","journal-title":"Pattern Recogn."},{"key":"13_CR2","unstructured":"Barnett, E.: 3.4 billion photographs on Google+ in 100 days. http:\/\/www.telegraph.co.uk\/technology\/google\/8838196\/3.4-billion-photog%raphs-on-Google-in-100-days.html(2011)"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1162\/coli.2006.32.1.13","volume":"32","author":"A Budanitsky","year":"2006","unstructured":"Budanitsky, A., Hirst, G.: Evaluating WordNet-based measures of lexical semantic relatedness. Comput. Linguist. 32(1), 13\u201347 (2006)","journal-title":"Comput. Linguist."},{"issue":"3","key":"13_CR4","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/TKDE.2007.48","volume":"19","author":"RL Cilibrasi","year":"2007","unstructured":"Cilibrasi, R.L., Vitanyi, P.M.B.: The Google similarity distance. IEEE Trans. Knowl. Data Eng. 19(3), 370\u2013383 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Fetterly, D., Manasse, M., Najork, M.: Spam, damn spam, and statistics: using statistical analysis to locate spam web pages. In: Proceedings of the ACM WebDB, Paris, pp. 1\u20136 (2004)","DOI":"10.1145\/1017074.1017077"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Gammeter, S., Bossard, L., Quack, T., van Gool, L.: I know what you did last summer: object level auto-annotation of holiday snaps. In: Proceedings of the ICCV, Kyoto, pp. 614\u2013621 (2009)","DOI":"10.1109\/ICCV.2009.5459180"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Gyongyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with TrustRank. In: Proceedings of the VLDB, Toronto, pp. 576\u2013587 (2004)","DOI":"10.1016\/B978-012088469-8\/50052-8"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Hays, J., Efros, A.A.: im2gps: Estimating geographic information from a single image. In: Proceedings of the IEEE CVPR, Anchorage, pp. 1\u20138 (2008)","DOI":"10.1109\/CVPR.2008.4587784"},{"issue":"6","key":"13_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6), 36\u201345 (2007)","journal-title":"IEEE Internet Comput."},{"key":"13_CR10","unstructured":"Hollenstein, L., Purves, R.: Exploring place through user-generated content: using Flickr to describe city cores. J. Spat. Inf. Sci. 1\u201329 (2010)"},{"key":"13_CR11","unstructured":"International Press Telecommunications Council: IPTC Photo Metadata Standard, IPTC Core 1.1 and IPTC Extension 1.1. Technical report (2009)"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2011.942345","volume":"29","author":"I Ivanov","year":"2012","unstructured":"Ivanov, I., Vajda, P., Lee, J.S., Ebrahimi, T.: In tags we trust: trust modeling in social tagging of multimedia content. IEEE Signal Proc. Mag. 29(2), 98\u2013107 (2012)","journal-title":"IEEE Signal Proc. Mag."},{"issue":"1","key":"13_CR13","first-page":"155","volume":"56","author":"I Ivanov","year":"2012","unstructured":"Ivanov, I., Vajda, P., Lee, J.S., Goldmann, L., Ebrahimi, T.: Geotag propagation in social networks based on user trust model. MTAP 56(1), 155\u2013177 (2012)","journal-title":"MTAP"},{"issue":"2","key":"13_CR14","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decision Support Syst."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Kennedy, L.S., Chang, S.F., Kozintsev, I.V.: To search or to label?: predicting the performance of search-based automatic image classifiers. In: Proceedings of the ACM MIR, Santa Barbara, pp. 249\u2013258 (2006)","DOI":"10.1145\/1178677.1178712"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Kennedy, L.S., Naaman, M.: Generating diverse and representative image search results for landmarks. In: Proceedings of the WWW, Beijing, pp. 297\u2013306 (2008)","DOI":"10.1145\/1367497.1367539"},{"key":"13_CR17","unstructured":"Kessler, S.: Mashable Infographics \u2013 Facebook Photos by the Numbers. http:\/\/www.mashable.com\/2011\/02\/14\/facebook-photo-infographic(2011)"},{"issue":"5","key":"13_CR18","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. JACM 46(5), 604\u2013632 (1999)","journal-title":"JACM"},{"issue":"4","key":"13_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1409220.1409225","volume":"2","author":"G. Koutrika","year":"2008","unstructured":"Koutrika, G., Effendi, F.A., Gy\u00f6ngyi, Z., Heymann, P., Garcia-Molina, H.: Combating spam in tagging systems: an evaluation. ACM TWEB 2(4), 22:1\u201322:34 (2008)","journal-title":"ACM TWEB"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Krause, B., Schmitz, C., Hotho, A., G., S.: The anti-social tagger: detecting spam in social bookmarking systems. In: Proceedings of the ACM AIRWeb, Beijing, pp. 61\u201368 (2008)","DOI":"10.1145\/1451983.1451998"},{"key":"13_CR21","unstructured":"Krestel, R., Chen, L.: Using co-occurence of tags and resources to identify spammers. In: Proceedings of the ECML PKDD, Antwerp, pp. 38\u201346 (2008)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Liu, K., Fang, B., Zhang, Y.: Detecting tag spam in social tagging systems with collaborative knowledge. In: Proceedings of the IEEE FSKD, Tianjin, pp. 427\u2013431 (2009)","DOI":"10.1109\/FSKD.2009.401"},{"issue":"2","key":"13_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"issue":"1","key":"13_CR24","first-page":"187","volume":"51","author":"J Luo","year":"2011","unstructured":"Luo, J., Joshi, D., Yu, J., Gallagher, A.: Geotagging in multimedia and computer vision \u2013 a survey. MTAP 51(1), 187\u2013211 (2011)","journal-title":"MTAP"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Markines, B., Cattuto, C., Menczer, F.: Social spam detection. In: Proceedings of the ACM AIRWeb, Madrid, pp. 41\u201348 (2009)","DOI":"10.1145\/1531914.1531924"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Marlow, C., Naaman, M., Boyd, D., Davis, M.: Ht06, tagging paper, taxonomy, flickr, academic article, to read. In: Proceedings of the ACM HT, Odense, pp. 31\u201340 (2006)","DOI":"10.1145\/1149941.1149949"},{"issue":"4","key":"13_CR27","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.comnet.2005.07.011","volume":"50","author":"S Marti","year":"2006","unstructured":"Marti, S., Garcia-Molina, H.: Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50(4), 472\u2013484 (2006)","journal-title":"Comput. Netw."},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Mikolajczyk, K., Schmid, C.: An affine invariant interest point detector. In: Proceedings of the ECCV, Copenhagen, pp. 128\u2013142 (2002)","DOI":"10.1007\/3-540-47969-4_9"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Proceedings of the IEEE CVPR, Madison, pp. I\u2013134\u2013I\u2013141 (2003)","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Nister, D., Stewenius, H.: Robust scalable recognition with a vocabulary tree. In: Proceedings of the IEEE CVPR, New York, pp. 2161\u20132168 (2006)","DOI":"10.1109\/CVPR.2006.264"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Noll, M.G., Yeung, C.A., Gibbins, N., Meinel, C., Shadbolt, N.: Telling experts from spammers: expertise ranking in folksonomies. In: Proceedings of the ACM SIGIR, Boston, pp. 612\u2013619 (2009)","DOI":"10.1145\/1571941.1572046"},{"key":"13_CR32","unstructured":"Parr, B.: Mashable Infographics \u2013 Facebook by the Numbers. http:\/\/www.mashable.com\/2011\/10\/21\/facebook-infographic(2011)"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Quack, T., Leibe, B., Van\u00a0Gool, L.: World-scale mining of objects and events from community photo collections. In: Proceedings of the IEEE CIVR, Niagara Falls, pp. 47\u201356 (2008)","DOI":"10.1145\/1386352.1386363"},{"key":"13_CR34","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayesian approach to filtering junk e-mail. Technical report, WS-98-05 (1998)"},{"key":"13_CR35","unstructured":"Technical Standardization Committee on AV & IT Storage Systems and Equipment: Exchangeable image file format for digital still cameras: Exif Version 2.2. Technical report, JEITA CP-3451 (2002)"},{"key":"13_CR36","unstructured":"Thomason, A.: Blog spam: A review. In: Proceedings of the CEAS, Mountain View (2007)"},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Vajda, P., Goldmann, L., Ebrahimi, T.: Analysis of the limits of graph-based object duplicate detection. In: Proceedings of the Symposium on Multimedia, San Diego, pp. 600\u2013605 (2009)","DOI":"10.1109\/ISM.2009.119"},{"issue":"3","key":"13_CR38","first-page":"19","volume":"1","author":"P Vajda","year":"2010","unstructured":"Vajda, P., Ivanov, I., Goldmann, L., Lee, J.S., Ebrahimi, T.: Robust duplicate detection of 2D and 3D objects. IJMDEM 1(3), 19\u201340 (2010)","journal-title":"IJMDEM"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Proceedings of the Eurocrypt, Warsaw, pp. 294\u2013311 (2003)","DOI":"10.1007\/3-540-39200-9_18"},{"issue":"5895","key":"13_CR40","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L. Ahn","year":"2008","unstructured":"von Ahn, L., Maurer, B., Mcmillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-based character recognition via web security measures. Science 321(5895), 1465\u20131468 (2008)","journal-title":"Science"},{"key":"13_CR41","unstructured":"Whitby, A., J\u00f8sang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems. In: Proceedings of the IEEE AAMAS, New York, pp. 106\u2013117 (2004)"},{"key":"13_CR42","unstructured":"Wikimedia Foundation Inc.: Wikipedia\u2013Flickr. http:\/\/en.wikipedia.org\/wiki\/Flickr(2012)"},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Wu, C.T., Cheng, K.T., Zhu, Q., Wu, Y.L.: Using visual features for anti-spam filtering. In: Proceedings of the IEEE ICIP, Genoa, vol.\u00a03, pp. III \u2013 509\u2013512 (2005)","DOI":"10.1109\/ICIP.2005.1530440"},{"key":"13_CR44","unstructured":"Xu, Z., Fu, Y., Mao, J., Su, D.: Towards the semantic web: collaborative tag suggestions. In: Proceedings of the ACM WWW, Santa Barbara (2006)"},{"key":"13_CR45","unstructured":"Yahoo! Inc.: Flickr \u2013 Tags. http:\/\/www.flickr.com\/help\/tags(2011)"},{"key":"13_CR46","doi-asserted-by":"crossref","unstructured":"Yang, Y., Sun, Y.L., Kay, S., Yang, Q.: Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In: Proceedings of the ACM SAC, Honolulu, pp. 1308\u20131315 (2009)","DOI":"10.1145\/1529282.1529575"},{"key":"13_CR47","doi-asserted-by":"crossref","unstructured":"Zheng, Y.T., Zhao, M., Song, Y., Adam, H., Buddemeier, U., Bissacco, A., Brucher, F., Chua, T., Neven, H.: Tour the World: building a web-scale landmark recognition engine. In: Proceedings of the IEEE CVPR, Miami, pp. 1085\u20131092 (2009)","DOI":"10.1109\/CVPR.2009.5206749"}],"container-title":["Computer Communications and Networks","Social Media Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-4555-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T06:57:35Z","timestamp":1745391455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-4555-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,13]]},"ISBN":["9781447145547","9781447145554"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-4555-4_13","relation":{},"ISSN":["1617-7975"],"issn-type":[{"type":"print","value":"1617-7975"}],"subject":[],"published":{"date-parts":[[2012,10,13]]},"assertion":[{"value":"13 October 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}