{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T04:02:17Z","timestamp":1747108937794,"version":"3.40.5"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031927430","type":"print"},{"value":"9783031927447","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92744-7_2","type":"book-chapter","created":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T11:51:28Z","timestamp":1747050688000},"page":"18-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Applying Rough Set-Based Feature Selection Method to\u00a0Spam Classification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1548-8499","authenticated-orcid":false,"given":"Cheng","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1008-7687","authenticated-orcid":false,"given":"Xiaoyu","family":"Lian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,13]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Alsmadi, I., Alhami, I.: Clustering and classification of email contents. J. King Saud Univ. Comput. Inf. Sci. 27(1), 46\u201357 (2015). https:\/\/doi.org\/10.1016\/j.jksuci.2014.03.014, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1319157814000573","DOI":"10.1016\/j.jksuci.2014.03.014"},{"key":"2_CR2","unstructured":"Asuncion, A., Newman, D., et\u00a0al.: UCI machine learning repository (2007)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Awad, W.A., ELseuofi, S.: Machine learning methods for spam e-mail classification. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 3(1), 173\u2013184 (2011)","DOI":"10.5121\/ijcsit.2011.3112"},{"key":"2_CR4","unstructured":"Bargiela, A., Pedrycz, W.: Granular computing. In: Handbook on Computer Learning and Intelligence: Volume 2: Deep Learning, Intelligent Control and Evolutionary Computation, pp. 97\u2013132. World Scientific (2022)"},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1214\/ss\/1177011077","volume":"8","author":"D Bertsimas","year":"1993","unstructured":"Bertsimas, D., Tsitsiklis, J.: Simulated annealing. Stat. Sci. 8(1), 10\u201315 (1993)","journal-title":"Stat. Sci."},{"issue":"5","key":"2_CR6","first-page":"1","volume":"13","author":"MA Chandra","year":"2021","unstructured":"Chandra, M.A., Bedi, S.: Survey on SVM and their application in image classification. Int. J. Inf. Technol. 13(5), 1\u201311 (2021)","journal-title":"Int. J. Inf. Technol."},{"issue":"6","key":"2_CR7","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1002\/wics.1278","volume":"5","author":"B De Ville","year":"2013","unstructured":"De Ville, B.: Decision trees. Wiley Interdiscip. Rev. Comput. Stat. 5(6), 448\u2013455 (2013)","journal-title":"Wiley Interdiscip. Rev. Comput. Stat."},{"issue":"2","key":"2_CR8","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1901\/jeab.1987.48-317","volume":"48","author":"L Fields","year":"1987","unstructured":"Fields, L., Verhave, T.: The structure of equivalence classes. J. Exp. Anal. Behav. 48(2), 317\u2013332 (1987)","journal-title":"J. Exp. Anal. Behav."},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland, J.H.: Genetic algorithms. Sci. Am. 267(1), 66\u201373 (1992)","journal-title":"Sci. Am."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Jensen, R.: Rough Set-Based Feature Selection: A Review. Rough Computing: Theories, Technologies and Applications, pp. 70\u2013107 (2008)","DOI":"10.4018\/978-1-59904-552-8.ch003"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/S0165-0114(03)00021-6","volume":"141","author":"R Jensen","year":"2004","unstructured":"Jensen, R., Shen, Q.: Fuzzy-rough attribute reduction with application to web categorization. Fuzzy Sets Syst. 141(3), 469\u2013485 (2004)","journal-title":"Fuzzy Sets Syst."},{"issue":"4","key":"2_CR12","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TFUZZ.2008.924209","volume":"17","author":"R Jensen","year":"2008","unstructured":"Jensen, R., Shen, Q.: New approaches to fuzzy-rough feature selection. IEEE Trans. Fuzzy Syst. 17(4), 824\u2013838 (2008)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Jogin, M., Madhulika, M., Divya, G., Meghana, R., Apoorva, S., et\u00a0al.: Feature extraction using convolution neural networks (CNN) and deep learning. In: 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 2319\u20132323. IEEE (2018)","DOI":"10.1109\/RTEICT42901.2018.9012507"},{"issue":"8","key":"2_CR14","doi-asserted-by":"publisher","first-page":"4773","DOI":"10.1016\/j.jksuci.2021.06.003","volume":"34","author":"M Khan","year":"2022","unstructured":"Khan, M., Islam, N., Uddin, J., Islam, S., Nasir, M.K.: Water quality prediction and classification based on principal component regression and gradient boosting classifier approach. J. King Saud Univ. Comput. Inf. Sci. 34(8), 4773\u20134781 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kotipalli, K., Suthaharan, S.: Modeling of class imbalance using an empirical approach with spambase dataset and random forest classification. In: Proceedings of the 3rd Annual Conference on Research in Information Technology, pp. 75\u201380 (2014)","DOI":"10.1145\/2656434.2656442"},{"issue":"4","key":"2_CR16","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/info10040150","volume":"10","author":"K Kowsari","year":"2019","unstructured":"Kowsari, K., Jafari Meimandi, K., Heidarysafa, M., Mendu, S., Barnes, L., Brown, D.: Text classification algorithms: a survey. Information 10(4), 150 (2019)","journal-title":"Information"},{"issue":"3","key":"2_CR17","doi-asserted-by":"publisher","first-page":"211","DOI":"10.6029\/smartcr.2014.03.007","volume":"4","author":"V Kumar","year":"2014","unstructured":"Kumar, V., Minz, S.: Feature selection. SmartCR 4(3), 211\u2013229 (2014)","journal-title":"SmartCR"},{"key":"2_CR18","unstructured":"Larose, D.T., Larose, C.D.: k-Nearest Neighbor Algorithm (2014)"},{"issue":"18","key":"2_CR19","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1161\/CIRCULATIONAHA.106.682658","volume":"117","author":"MP LaValley","year":"2008","unstructured":"LaValley, M.P.: Logistic regression. Circulation 117(18), 2395\u20132399 (2008)","journal-title":"Circulation"},{"issue":"6","key":"2_CR20","first-page":"57","volume":"6","author":"J Liu","year":"2006","unstructured":"Liu, J., Sun, J., Wang, S.: Pattern recognition: an overview. IJCSNS Int. J. Comput. Sci. Netw. Secur. 6(6), 57\u201361 (2006)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Mansoor, R., Jayasinghe, N.D., Muslam, M.M.A.: A comprehensive review on email spam classification using machine learning algorithms. In: 2021 International Conference on Information Networking (ICOIN), pp. 327\u2013332. IEEE (2021)","DOI":"10.1109\/ICOIN50884.2021.9334020"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Mao, K.Z.: Orthogonal forward selection and backward elimination algorithms for feature subset selection. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 34(1), 629\u2013634 (2004)","DOI":"10.1109\/TSMCB.2002.804363"},{"issue":"1","key":"2_CR23","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.compag.2011.03.008","volume":"77","author":"S Mathanker","year":"2011","unstructured":"Mathanker, S., Weckler, P., Bowser, T., Wang, N., Maness, N.: AdaBoost classifiers for pecan defect classification. Comput. Electron. Agric. 77(1), 60\u201368 (2011)","journal-title":"Comput. Electron. Agric."},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/01431160412331269698","volume":"26","author":"M Pal","year":"2005","unstructured":"Pal, M.: Random forest classifier for remote sensing classification. Int. J. Remote Sens. 26(1), 217\u2013222 (2005)","journal-title":"Int. J. Remote Sens."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Pawlak, Z.: Granularity of knowledge, indiscernibility and rough sets. In: 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No. 98CH36228), vol.\u00a01, pp. 106\u2013110. IEEE (1998)","DOI":"10.1109\/FUZZY.1998.687467"},{"issue":"3","key":"2_CR26","first-page":"38","volume":"15","author":"Z Pawlak","year":"2001","unstructured":"Pawlak, Z., Polkowski, L., Skowron, A.: Rough set theory. KI 15(3), 38\u201339 (2001)","journal-title":"KI"},{"issue":"11","key":"2_CR27","doi-asserted-by":"publisher","first-page":"3671","DOI":"10.1016\/j.asoc.2012.05.024","volume":"12","author":"N P\u00e9rez-D\u00edaz","year":"2012","unstructured":"P\u00e9rez-D\u00edaz, N., Ruano-Ordas, D., Mendez, J.R., Galvez, J.F., Fdez-Riverola, F.: Rough sets for spam filtering: selecting appropriate decision rules for boundary e-mail classification. Appl. Soft Comput. 12(11), 3671\u20133682 (2012)","journal-title":"Appl. Soft Comput."},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.ijar.2017.10.012","volume":"92","author":"MS Raza","year":"2018","unstructured":"Raza, M.S., Qamar, U.: Feature selection using rough set-based direct dependency calculation by avoiding the positive region. Int. J. Approximate Reasoning 92, 175\u2013197 (2018)","journal-title":"Int. J. Approximate Reasoning"},{"key":"2_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105699","volume":"84","author":"MS Raza","year":"2019","unstructured":"Raza, M.S., Qamar, U.: A parallel approach to calculate lower and upper approximations in dominance based rough set theory. Appl. Soft Comput. 84, 105699 (2019)","journal-title":"Appl. Soft Comput."},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Renuka, D.K., Hamsapriya, T., Chakkaravarthi, M.R., Surya, P.L.: Spam classification based on supervised learning using machine learning techniques. In: 2011 International Conference on Process Automation, Control and Computing, pp.\u00a01\u20137. IEEE (2011)","DOI":"10.1109\/PACC.2011.5979035"},{"issue":"5","key":"2_CR31","first-page":"1890","volume":"3","author":"AK Sharma","year":"2011","unstructured":"Sharma, A.K., Sahni, S.: A comparative study of classification algorithms for spam email data analysis. Int. J. Comput. Sci. Eng. 3(5), 1890\u20131895 (2011)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"2_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D 404, 132306 (2020)","journal-title":"Physica D"},{"key":"2_CR33","first-page":"65","volume":"15","author":"R Slowinski","year":"1992","unstructured":"Slowinski, R.: A generalization of the indiscernibility relation for rough set analysis of quantitative information. Riv. Mat. Sci. Econom. Social. 15, 65\u201378 (1992)","journal-title":"Riv. Mat. Sci. Econom. Social."},{"issue":"1","key":"2_CR34","first-page":"19","volume":"6","author":"K Thangavel","year":"2006","unstructured":"Thangavel, K., Shen, Q., Pethalakshmi, A.: Application of clustering for feature selection based on rough set theory approach. AIML J. 6(1), 19\u201327 (2006)","journal-title":"AIML J."},{"key":"2_CR35","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-319-26690-9_41","volume-title":"The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), November 28-30, 2015, Beni Suef, Egypt","author":"A Tharwat","year":"2016","unstructured":"Tharwat, A., Gaber, T., Awad, Y.M., Dey, N., Hassanien, A.E.: Plants identification using feature fusion technique and bagging classifier. In: Gaber, T., Hassanien, A.E., El-Bendary, N., Dey, N. (eds.) The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), November 28-30, 2015, Beni Suef, Egypt. AISC, vol. 407, pp. 461\u2013471. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-26690-9_41"},{"issue":"1","key":"2_CR36","first-page":"713","volume":"15","author":"GI Webb","year":"2010","unstructured":"Webb, G.I., Keogh, E., Miikkulainen, R.: Na\u00efve bayes. Encycl. Mach. Learn. 15(1), 713\u2013714 (2010)","journal-title":"Encycl. Mach. Learn."},{"key":"2_CR37","first-page":"286","volume":"1","author":"Y Yao","year":"1998","unstructured":"Yao, Y.: Generalized rough set models. Rough sets in knowledge discovery 1, 286\u2013318 (1998)","journal-title":"Rough sets in knowledge discovery"},{"key":"2_CR38","doi-asserted-by":"publisher","unstructured":"Youn, S., McLeod, D.: A comparative study for email classification. In: In: Elleithy, K. (eds.) Advances and innovations in systems, computing sciences and software engineering, pp. 387\u2013391. Springer, Dordrecht (2007). https:\/\/doi.org\/10.1007\/978-1-4020-6264-3_67","DOI":"10.1007\/978-1-4020-6264-3_67"},{"issue":"3","key":"2_CR39","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Inf. Control 8(3), 338\u2013353 (1965)","journal-title":"Inf. Control"},{"issue":"4","key":"2_CR40","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.trit.2016.11.001","volume":"1","author":"Q Zhang","year":"2016","unstructured":"Zhang, Q., Xie, Q., Wang, G.: A survey on rough set theory and its applications. CAAI Trans. Intell. Technol. 1(4), 323\u2013333 (2016)","journal-title":"CAAI Trans. Intell. Technol."},{"key":"2_CR41","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.knosys.2018.03.031","volume":"151","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Mei, C., Chen, D., Yang, Y.: A fuzzy rough set-based feature selection method using representative instances. Knowl. Based Syst. 151, 216\u2013229 (2018)","journal-title":"Knowl. Based Syst."}],"container-title":["Lecture Notes in Computer Science","Rough Sets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92744-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T11:51:43Z","timestamp":1747050703000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92744-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031927430","9783031927447"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92744-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IJCRS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Rough Sets","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chongqing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ijcrs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ijcrs2025.cqupt.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}