Most legitimate calls are from persons or organizations with strong social ties such as friends. Some legitimate calls, however, are from those with weak social ties such as a restaurant the callee booked a table on-line. Since a callee's contact list usually contains only the addresses of persons or organizations with strong social ties, filtering out unsolicited calls using the contact list is prone to false positives. To reduce these false positives, we first analyzed call logs and identified that legitimate calls are initiated from persons or organizations with weak social ties through transactions over the web or email exchanges. This paper proposes two approaches to label incoming calls by using cross-media relations to previous conta...
Spam and unwanted content has been a significant challenge for the Internet technologies (Email, soc...
Unwanted communication ranges fromnuisance (junk mail) to annoyance(telemarketing) to dangerous to t...
Phishers nowadays rely on a variety of channels, ranging from old-fashioned emails to instant messag...
Most legitimate calls are from persons or organizations with strong social ties such as friends. Som...
The number of unsolicited and advertisement telephony calls over traditional and Internet telephony ...
Telephony technologies (mobile, VoIP, and fixed) have potentially improved the way we communicate in...
Telephony technologies (mobile, VoIP, and fixed) have potentially improved the way we communicate in...
Unsolicited emails, more commonly known as spam, have plagued the use and efficiency of email since ...
Spam telephone calls decrease customer confidence in unknown callers; consequently, businesses can e...
Abstract. The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real ...
Spam over Internet Telephony (SPIT) is a form of un-solicited communication whereby an attacker send...
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN archite...
The development of social networks has changed the way we communicate from a personal conversation i...
Telecommunication systems have evolved significantly and the recent convergence of telephony allows ...
System and method are disclosed to detect spam in outgoing or incoming calls on a telephone device. ...
Spam and unwanted content has been a significant challenge for the Internet technologies (Email, soc...
Unwanted communication ranges fromnuisance (junk mail) to annoyance(telemarketing) to dangerous to t...
Phishers nowadays rely on a variety of channels, ranging from old-fashioned emails to instant messag...
Most legitimate calls are from persons or organizations with strong social ties such as friends. Som...
The number of unsolicited and advertisement telephony calls over traditional and Internet telephony ...
Telephony technologies (mobile, VoIP, and fixed) have potentially improved the way we communicate in...
Telephony technologies (mobile, VoIP, and fixed) have potentially improved the way we communicate in...
Unsolicited emails, more commonly known as spam, have plagued the use and efficiency of email since ...
Spam telephone calls decrease customer confidence in unknown callers; consequently, businesses can e...
Abstract. The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real ...
Spam over Internet Telephony (SPIT) is a form of un-solicited communication whereby an attacker send...
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN archite...
The development of social networks has changed the way we communicate from a personal conversation i...
Telecommunication systems have evolved significantly and the recent convergence of telephony allows ...
System and method are disclosed to detect spam in outgoing or incoming calls on a telephone device. ...
Spam and unwanted content has been a significant challenge for the Internet technologies (Email, soc...
Unwanted communication ranges fromnuisance (junk mail) to annoyance(telemarketing) to dangerous to t...
Phishers nowadays rely on a variety of channels, ranging from old-fashioned emails to instant messag...