{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:40:06Z","timestamp":1746366006242,"version":"3.40.4"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118567"},{"type":"electronic","value":"9783319118574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11857-4_26","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T13:04:11Z","timestamp":1409749451000},"page":"223-233","source":"Crossref","is-referenced-by-count":2,"title":["An Adaptive Concentration Selection Model for Spam Detection"],"prefix":"10.1007","author":[{"given":"Yang","family":"Gao","sequence":"first","affiliation":[]},{"given":"Guyue","family":"Mi","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"CYREN: Internet threats trend report: April 2014. Tech. rep. (2014)","key":"26_CR1"},{"key":"26_CR2","first-page":"98","volume-title":"Learning for Text Categorization: Papers from the 1998 Workshop","author":"M. Sahami","year":"1998","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayesian approach to filtering junk e-mail. In: Learning for Text Categorization: Papers from the 1998 Workshop, vol.\u00a062, pp. 98\u2013105. AAAI Technical Report WS-98-05, Madison (1998)"},{"issue":"1","key":"26_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.patrec.2007.07.018","volume":"29","author":"A. Ciltik","year":"2008","unstructured":"Ciltik, A., Gungor, T.: Time-efficient spam e-mail filtering using n-gram models. Pattern Recognition Letters\u00a029(1), 19\u201333 (2008)","journal-title":"Pattern Recognition Letters"},{"unstructured":"Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C., Stamatopoulos, P.: Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach. Arxiv preprint cs\/0009009 (2000)","key":"26_CR4"},{"issue":"1","key":"26_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1023\/A:1022948414856","volume":"6","author":"G. Sakkis","year":"2003","unstructured":"Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C., Stamatopoulos, P.: A memory-based approach to anti-spam filtering for mailing lists. Information Retrieval\u00a06(1), 49\u201373 (2003)","journal-title":"Information Retrieval"},{"issue":"5","key":"26_CR6","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H. Drucker","year":"1999","unstructured":"Drucker, H., Wu, D., Vapnik, V.: Support vector machines for spam categorization. IEEE Transactions on Neural Networks\u00a010(5), 1048\u20131054 (1999)","journal-title":"IEEE Transactions on Neural Networks"},{"doi-asserted-by":"crossref","unstructured":"Clark, J., Koprinska, I., Poon, J.: A neural network based approach to automated e-mail classification. In: Proceedings of the IEEE\/WIC International Conference on Web Intelligence, WI 2003, pp. 702\u2013705. IEEE (2003)","key":"26_CR7","DOI":"10.1109\/WI.2003.1241300"},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1016\/j.eswa.2008.03.002","volume":"36","author":"C. Wu","year":"2009","unstructured":"Wu, C.: Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Systems with Applications\u00a036(3), 4321\u20134330 (2009)","journal-title":"Expert Systems with Applications"},{"doi-asserted-by":"crossref","unstructured":"Yang, Y.: Noise reduction in a statistical approach to text categorization. In: Proceedings of the 18th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 256\u2013263. ACM (1995)","key":"26_CR9","DOI":"10.1145\/215206.215367"},{"doi-asserted-by":"crossref","unstructured":"Tan, Y., Deng, C., Ruan, G.: Concentration based feature construction approach for spam detection. In: International Joint Conference on Neural Networks, IJCNN 2009, pp. 3088\u20133093. IEEE (2009)","key":"26_CR10","DOI":"10.1109\/IJCNN.2009.5178651"},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s00500-009-0440-2","volume":"14","author":"G. Ruan","year":"2010","unstructured":"Ruan, G., Tan, Y.: A three-layer back-propagation neural network for spam detection using artificial immune concentration. Soft Computing\u00a014(2), 139\u2013150 (2010)","journal-title":"Soft Computing"},{"doi-asserted-by":"crossref","unstructured":"Zhu, Y., Tan, Y.: Extracting discriminative information from e-mail for spam detection inspired by immune system. In: 2010 IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20137. IEEE (2010)","key":"26_CR12","DOI":"10.1109\/CEC.2010.5586290"},{"issue":"2","key":"26_CR13","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/TIFS.2010.2103060","volume":"6","author":"Y. Zhu","year":"2011","unstructured":"Zhu, Y., Tan, Y.: A local-concentration-based feature extraction approach for spam filtering. IEEE Transactions on Information Forensics and Security\u00a06(2), 486\u2013497 (2011)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T. Cover","year":"1967","unstructured":"Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Transactions on Information Theory\u00a013(1), 21\u201327 (1967)","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"Androutsopoulos, I., Paliouras, G., Michelakis, E.: Learning to filter unsolicited commercial e-mail. \u201cDEMOKRITOS\u201d. National Center for Scientific Research (2004)","key":"26_CR15"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11857-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:00:30Z","timestamp":1746363630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11857-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118567","9783319118574"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11857-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}