{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:04:31Z","timestamp":1740096271279,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642307201"},{"type":"electronic","value":"9783642307218"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30721-8_2","type":"book-chapter","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T13:37:09Z","timestamp":1338385029000},"page":"13-23","source":"Crossref","is-referenced-by-count":2,"title":["Unsupervised Feature Selection for Spherical Data Modeling: Application to Image-Based Spam Filtering"],"prefix":"10.1007","author":[{"given":"Ola","family":"Amayri","sequence":"first","affiliation":[]},{"given":"Nizar","family":"Bouguila","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"2_CR1","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TAC.1974.1100705","volume":"19","author":"H. Akaike","year":"1974","unstructured":"Akaike, H.: A new look at the statistical model identification. IEEE Transaction on Automatic Control\u00a019(6), 716\u2013723 (1974)","journal-title":"IEEE Transaction on Automatic Control"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1008928315401","volume":"10","author":"R. Baxter","year":"2000","unstructured":"Baxter, R., Oliver, J.: Finding Overlapping Components with MML. Statistics and Computing\u00a010(1), 5\u201316 (2000)","journal-title":"Statistics and Computing"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Ben-Bassat, M.: Use of Distance Measures, Information Measures and Error Bounds in Feature Evaluation, ch. 35, pp. 773\u2013791. Elsevier Science Pub Co.","DOI":"10.1016\/S0169-7161(82)02038-0"},{"issue":"12","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TKDE.2009.42","volume":"21","author":"N. Bouguila","year":"2009","unstructured":"Bouguila, N.: A model-based approach for discrete data clustering and feature weighting using map and stochastic complexity. IEEE Transactions on Knowledge and Data Engineering\u00a021(12), 1649\u20131664 (2009)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"8","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1109\/TPAMI.2008.155","volume":"31","author":"S. Boutemedjet","year":"2009","unstructured":"Boutemedjet, S., Bouguila, N., Ziou, D.: A hybrid feature extraction selection approach for high-dimensional non-gaussian data clustering. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a031(8), 1429\u20131443 (2009)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D.G. Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision\u00a060(2), 91\u2013110 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Dowe, D.L., Oliver, J.J., Baxter, R.A., Wallace, C.S.: Bayesian estimation of the von mises concentration parameter. In: Proceedings of the Fifteenth International Workshop on Maximum Entropy and Bayesian Methods, pp. 51\u201359. Kluwer Academic (1995)","DOI":"10.1007\/978-94-011-5430-7_6"},{"key":"2_CR8","unstructured":"Dredze, M., Gevaryahu, R., Elias-Bachrach, A.: Learning fast classifiers for image spam. In: CEAS (2007)"},{"key":"2_CR9","unstructured":"Erdogmus, D.: Information theoretic learning: Renyi\u2019s entropy and its applications to adaptive. Ph.D. thesis, University of Florida (2002)"},{"key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511564345","volume-title":"Statistical analysis of circular data","author":"N.I. Fisher","year":"1993","unstructured":"Fisher, N.I.: Statistical analysis of circular data, 1st edn. Cambridge University Press, Cambridge (1993)","edition":"1"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/ICME.2009.5202711","volume-title":"Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2009","author":"J.H. Hsia","year":"2009","unstructured":"Hsia, J.H., Chen, M.S.: Language-model-based detection cascade for efficient classification of image-based spam e-mail. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME 2009, pp. 1182\u20131185. IEEE Press, Piscataway (2009)"},{"issue":"1-2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1023\/A:1007612920971","volume":"42","author":"I.S. Dhillon","year":"2001","unstructured":"Dhillon, I.S., Modha, D.S.: Concept Decompositions for Large Sparse Text Data Using Clustering. Machine Learning\u00a042(1-2), 143\u2013175 (2001)","journal-title":"Machine Learning"},{"key":"2_CR13","unstructured":"Jaakkola, T.S., Haussler, D.: Exploiting generative models in discriminative classifiers. In: Proceedings of Advances in Neural Information Systems (NIPS), pp. 487\u2013493. MIT Press (1998)"},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/34.574797","volume":"19","author":"A. Jain","year":"1997","unstructured":"Jain, A., Zongker, D.: Feature selection: evaluation, application, and small sample performance. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019(2), 153\u2013158 (1997)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"5","key":"2_CR15","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/BF00336961","volume":"50","author":"J.J. Koenderink","year":"1984","unstructured":"Koenderink, J.J.: The structure of images. Biological Cybernetics\u00a050(5), 363\u2013370 (1984), \n                  \n                    http:\/\/dx.doi.org\/10.1007\/BF00336961","journal-title":"Biological Cybernetics"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1109\/TPAMI.2004.71","volume":"26","author":"M.H.C. Law","year":"2004","unstructured":"Law, M.H.C., Figueiredo, M.A.T., Jain, A.K.: Simultaneous feature selection and clustering using mixture models. IEEE Trans. Pattern Anal. Mach. Intell\u00a026, 1154\u20131166 (2004)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Lemos, A., Caminhas, W., Gomide, F.: Evolving fuzzy linear regression trees with feature selection. In: 2011 IEEE Workshop on Evolving and Adaptive Intelligent Systems (EAIS), pp. 31\u201338 (April 2011)","DOI":"10.1109\/EAIS.2011.5945919"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Lindeberg, T.: Scale-space theory: A basic tool for analysing structures at different scales. Journal of Applied Statistics, 224\u2013270 (1994)","DOI":"10.1080\/757582976"},{"key":"2_CR19","volume-title":"Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics","author":"Q. Liu","year":"2010","unstructured":"Liu, Q., Qin, Z., Cheng, H., Wan, M.: Efficient modeling of spam images. In: Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics. IEEE Computer Society, Washington, DC (2010)"},{"key":"2_CR20","unstructured":"Mardia, K.V.: Statistics of directional data. Academic Press (1972)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Mehta, B., Nangia, S., Gupta, M., Nejdl, W.: Detecting image spam using visual features and near duplicate detection. In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, pp. 497\u2013506 (2008)","DOI":"10.1145\/1367497.1367565"},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/34.990133","volume":"24","author":"P. Mitra","year":"2002","unstructured":"Mitra, P., Murthy, C., Pal, S.: Unsupervised feature selection using feature similarity. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a024(3), 301\u2013312 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Perronnin, F., Dance, C.R.: Fisher kernels on visual vocabularies for image categorization. In: CVPR. IEEE Computer Society (2007)","DOI":"10.1109\/CVPR.2007.383266"},{"key":"2_CR24","unstructured":"Herbrich, R., Graepel, T.: A PAC-Bayesian Margin Bound for Linear Classifiers: Why SVMs Work. In: Proceedings of Advances in Neural Information Processing Systems (NIPS), pp. 224\u2013230 (2000)"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/0005-1098(78)90005-5","volume":"14","author":"J. Rissanen","year":"1987","unstructured":"Rissanen, J.: Modeling by shortest data discription. Automatica\u00a014, 465\u2013471 (1987)","journal-title":"Automatica"},{"issue":"19","key":"2_CR26","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1093\/bioinformatics\/btm344","volume":"23","author":"Y. Saeys","year":"2007","unstructured":"Saeys, Y., Inza, I.N., Larra\u00f1aga, P.: A review of feature selection techniques in bioinformatics. Bioinformatics\u00a023(19), 2507\u20132517 (2007)","journal-title":"Bioinformatics"},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1214\/aos\/1176344136","volume":"6","author":"G. Schwarz","year":"1978","unstructured":"Schwarz, G.: Estimating dimension of a model. Annals of Statistics\u00a06, 461\u2013464 (1978)","journal-title":"Annals of Statistics"},{"key":"2_CR28","volume-title":"Statistical Analysis of Finite Mixture Distributions","author":"D. Titterington","year":"1985","unstructured":"Titterington, D., Smith, A., Makov, U.: Statistical Analysis of Finite Mixture Distributions. John Wiley & Sons, Chichester (1985)"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30721-8_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:28:17Z","timestamp":1620127697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30721-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642307201","9783642307218"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30721-8_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}