{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:47:52Z","timestamp":1725857272824},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319409726"},{"type":"electronic","value":"9783319409733"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40973-3_20","type":"book-chapter","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T23:00:19Z","timestamp":1465858819000},"page":"205-216","source":"Crossref","is-referenced-by-count":2,"title":["Term Space Partition Based Ensemble Feature Construction for Spam Detection"],"prefix":"10.1007","author":[{"given":"Guyue","family":"Mi","sequence":"first","affiliation":[]},{"given":"Yang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,14]]},"reference":[{"key":"20_CR1","unstructured":"Research, F.: Spam, spammers, and spam control: a white paper by ferris research. Technical report (2009)"},{"key":"20_CR2","unstructured":"Corporation, S.: Internet security threat report. Technical report (2016)"},{"key":"20_CR3","unstructured":"Cyren: Cyber threat report. Technical report (2016)"},{"key":"20_CR4","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian approach to filtering junk e-mail. In: Learning for Text Categorization: Papers from the 1998 Workshop, vol. 62. AAAI Technical Report WS-98-05 98\u2013105, Madison (1998)"},{"issue":"3","key":"20_CR5","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s13174-010-0014-7","volume":"1","author":"T Almeida","year":"2011","unstructured":"Almeida, T., Almeida, J., Yamakami, A.: Spam filtering: how the dimensionality reduction affects the accuracy of naive bayes classifiers. J. Internet Serv. Appl. 1(3), 183\u2013200 (2011)","journal-title":"J. Internet Serv. Appl."},{"issue":"1","key":"20_CR6","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/TC.2010.92","volume":"60","author":"Z Zhong","year":"2011","unstructured":"Zhong, Z., Li, K.: Speed up statistical spam filter by approximation. IEEE Trans. Comput. 60(1), 120\u2013134 (2011)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"20_CR7","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/2600617.2600622","volume":"14","author":"SK Trivedi","year":"2014","unstructured":"Trivedi, S.K., Dey, S.: Interaction between feature subset selection techniques and machine learning classifiers for detecting unsolicited emails. ACM SIGAPP Appl. Comput. Rev. 14(1), 53\u201361 (2014)","journal-title":"ACM SIGAPP Appl. Comput. Rev."},{"issue":"5","key":"20_CR8","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","volume":"10","author":"H Drucker","year":"1999","unstructured":"Drucker, H., Wu, D., Vapnik, V.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 1048\u20131054 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"2","key":"20_CR9","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1109\/TIFS.2010.2103060","volume":"6","author":"Y Zhu","year":"2011","unstructured":"Zhu, Y., Tan, Y.: A local-concentration-based feature extraction approach for spam filtering. IEEE Trans. Inf. Forensics Secur. 6(2), 486\u2013497 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"20_CR10","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/TPAMI.2011.114","volume":"34","author":"L Duan","year":"2012","unstructured":"Duan, L., Tsang, I.W., Xu, D.: Domain transfer multiple kernel learning. IEEE Trans. Pattern Anal. Mach. Intell. 34(3), 465\u2013479 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"20_CR11","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.neucom.2012.12.001","volume":"108","author":"C Li","year":"2013","unstructured":"Li, C., Liu, M.: An ontology enhanced parallel SVM for scalable spam filter training. Neurocomputing 108, 45\u201357 (2013)","journal-title":"Neurocomputing"},{"key":"20_CR12","unstructured":"Carreras, X., Marquez, L.: Boosting trees for anti-spam email filtering. Arxiv preprint cs\/0109015 (2001)"},{"issue":"10","key":"20_CR13","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1016\/j.patrec.2012.03.012","volume":"33","author":"D DeBarr","year":"2012","unstructured":"DeBarr, D., Wechsler, H.: Spam detection using random boost. Pattern Recogn. Lett. 33(10), 1237\u20131244 (2012)","journal-title":"Pattern Recogn. Lett."},{"key":"20_CR14","unstructured":"Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C., Stamatopoulos, P.: Learning to filter spam e-mail: a comparison of a naive Bayesian and a memory-based approach. Arxiv preprint cs\/0009009 (2000)"},{"issue":"1","key":"20_CR15","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1023\/A:1022948414856","volume":"6","author":"G Sakkis","year":"2003","unstructured":"Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C., Stamatopoulos, P.: A memory-based approach to anti-spam filtering for mailing lists. Inf. Retr. 6(1), 49\u201373 (2003)","journal-title":"Inf. Retr."},{"issue":"1","key":"20_CR16","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1016\/j.eswa.2011.08.040","volume":"39","author":"S Jiang","year":"2012","unstructured":"Jiang, S., Pang, G., Wu, M., Kuang, L.: An improved k-nearest-neighbor algorithm for text categorization. Expert Syst. Appl. 39(1), 1503\u20131509 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"20_CR17","doi-asserted-by":"crossref","first-page":"2167","DOI":"10.1016\/j.ins.2006.12.005","volume":"177","author":"I Koprinska","year":"2007","unstructured":"Koprinska, I., Poon, J., Clark, J., Chan, J.: Learning to classify e-mail. Inf. Sci. 177(10), 2167\u20132187 (2007)","journal-title":"Inf. Sci."},{"issue":"3","key":"20_CR18","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MSP.2011.154","volume":"10","author":"R Amin","year":"2012","unstructured":"Amin, R., Ryan, J., van Dorp, J.R.: Detecting targeted malicious email. IEEE Secur. Priv. 10(3), 64\u201371 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Clark, J., Koprinska, I., Poon, J.: A neural network based approach to automated e-mail classification. In: Proceedings. IEEE\/WIC International Conference on Web Intelligence, 2003, WI 2003, pp. 702\u2013705. IEEE (2003)","DOI":"10.1109\/WI.2003.1241300"},{"issue":"3","key":"20_CR20","doi-asserted-by":"crossref","first-page":"4321","DOI":"10.1016\/j.eswa.2008.03.002","volume":"36","author":"C Wu","year":"2009","unstructured":"Wu, C.: Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Syst. Appl. 36(3), 4321\u20134330 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"20_CR21","first-page":"139","volume":"14","author":"G Ruan","year":"2010","unstructured":"Ruan, G., Tan, Y.: A three layer back-propagation neural network for spam detection using artificial immune concentration. Soft Comput. Fusion Found. Methodol. Appl. 14(2), 139\u2013150 (2010)","journal-title":"Soft Comput. Fusion Found. Methodol. Appl."},{"key":"20_CR22","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.neucom.2011.09.036","volume":"92","author":"CH Li","year":"2012","unstructured":"Li, C.H., Huang, J.X.: Spam filtering using semantic similarity approach and adaptive BPNN. Neurocomputing 92, 88\u201397 (2012)","journal-title":"Neurocomputing"},{"key":"20_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-20472-7_1","volume-title":"Advances in Swarm and Computational Intelligence","author":"G Mi","year":"2015","unstructured":"Mi, G., Gao, Y., Tan, Y.: Apply stacked auto-encoder to spam detection. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds.) ICSI-CCI 2015. LNCS, vol. 9141, pp. 3\u201315. Springer, Heidelberg (2015)"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Gao, Y., Mi, G., Tan, Y.: Variable length concentration based feature construction method for spam detection. In: 2015 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/IJCNN.2015.7280346"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Mi, G., Zhang, P., Tan, Y.: Feature construction approach for email categorization based on term space partition. In: The 2013 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/IJCNN.2013.6707020"},{"key":"20_CR26","unstructured":"Androutsopoulos, I., Paliouras, G., Michelakis, E.: Learning to filter unsolicited commercial e-mail. DEMOKRITOS, National Center for Scientific Research (2004)"},{"key":"20_CR27","unstructured":"Metsis, V., Androutsopoulos, I., Paliouras, G.: Spam filtering with naive bayes-which naive bayes. In: Third Conference on Email and Anti-spam (CEAS), vol. 17, pp. 28\u201369 (2006)"},{"issue":"1","key":"20_CR28","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.: The weka data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newsl."},{"issue":"3","key":"20_CR29","first-page":"27","volume":"2","author":"C Chang","year":"2011","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"issue":"7","key":"20_CR30","doi-asserted-by":"crossref","first-page":"10206","DOI":"10.1016\/j.eswa.2009.02.037","volume":"36","author":"T Guzella","year":"2009","unstructured":"Guzella, T., Caminhas, W.: A review of machine learning approaches to spam filtering. Expert Syst. Appl. 36(7), 10206\u201310222 (2009)","journal-title":"Expert Syst. Appl."},{"key":"20_CR31","unstructured":"Yang, Y., Pedersen, J.: A comparative study on feature selection in text categorization. In: Machine Learning-International Workshop Then Conference, pp. 412\u2013420. Morgan Kaufmann Publishers, Inc. (1997)"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Tan, Y., Deng, C., Ruan, G.: Concentration based feature construction approach for spam detection. In: International Joint Conference on Neural Networks, 2009, IJCNN 2009, pp. 3088\u20133093. IEEE (2009)","DOI":"10.1109\/IJCNN.2009.5178651"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Tan, Y.: Extracting discriminative information from e-mail for spam detection inspired by immune system. In: 2010 IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20137. IEEE (2010)","DOI":"10.1109\/CEC.2010.5586290"}],"container-title":["Lecture Notes in Computer Science","Data Mining and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40973-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:18:21Z","timestamp":1498321101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40973-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319409726","9783319409733"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40973-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}