{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:40:03Z","timestamp":1744000803973,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330179"},{"type":"electronic","value":"9783642330186"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33018-6_25","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:14:19Z","timestamp":1345713259000},"page":"245-252","source":"Crossref","is-referenced-by-count":8,"title":["Combined Classifiers with Neural Fuser for Spam Detection"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Zmy\u015blony","sequence":"first","affiliation":[]},{"given":"Bartosz","family":"Krawczyk","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Wo\u017aniak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-12127-2_8","volume-title":"Multiple Classifier Systems","author":"B. Biggio","year":"2010","unstructured":"Biggio, B., Fumera, G., Roli, F.: Multiple Classifier Systems under Attack. In: El Gayar, N., Kittler, J., Roli, F. (eds.) MCS 2010. LNCS, vol.\u00a05997, pp. 74\u201383. Springer, Heidelberg (2010)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning based techniques of email spam filtering. A Technical Report, University of Trento (2008)","DOI":"10.1007\/s10462-009-9109-6"},{"key":"25_CR3","unstructured":"Calton, P., Webb, S.: Observed trends in spam construction techniques: A case study of spam evolution. In: Proc of the 3rd Conference on E-mail and Anti-Spam, Mountain View, USA (2006)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Caruana, G., Li, M., Qi, M.: A MapReduce based parallel SVM for large scale spam filtering. In: Proc. of the 8th International Conference on Fuzzy Systems and Knowledge Discovery (2011)","DOI":"10.1109\/FSKD.2011.6020074"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Chih-Chin, L., Ming-Chi, T.: An empirical performance comparison of machine learning methods for spam e-mail categorization. In: Hybrid Intelligent Systems, pp. 44\u201348 (2004)","DOI":"10.1109\/ICHIS.2004.21"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Dai, N., Davison, B.D., Qi, X.: Looking into the past to better classify web spam. In: AIRWeb 2009: Proc. of the 5th International Workshop on Adversarial Information Retrieval on the Web. ACM Press (2009)","DOI":"10.1145\/1531914.1531916"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.knosys.2004.10.002","volume":"18","author":"S.J. Delany","year":"2005","unstructured":"Delany, S.J., Cunningham, P., Tsymbal, A., Coylem, L.: A case-based technique for tracking concept drift in spam filtering. Know.-Based Syst.\u00a018, 187\u2013195 (2005)","journal-title":"Know.-Based Syst."},{"issue":"2","key":"25_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0952813X.2011.610033","volume":"24","author":"L. Diao","year":"2012","unstructured":"Diao, L., Yang, C., Wang, H.: Training SVM email classifiers using very large imbalanced dataset. Journal of Experimental and Theoretical Artificial Intelligence\u00a024(2), 193\u2013210 (2012)","journal-title":"Journal of Experimental and Theoretical Artificial Intelligence"},{"key":"25_CR9","unstructured":"Duin, R.P.W., Juszczak, P., Paclik, P., Pekalska, E., de Ridder, D., Tax, D.M.M.: PRTools4, A Matlab Toolbox for Pattern Recognition. Delft University of Technology (2004)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Erdelyi, M., Benczur, A.A., Masanes, J., Siklosi, D.: Web spam filtering in internet archives. In: AIRWeb 2009: Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web. ACM Press (2009)","DOI":"10.1145\/1531914.1531918"},{"key":"25_CR11","volume-title":"Joint WICOW\/AIRWeb Workshop on Web Quality In Conjunction with the 20th International World Web Conference in Hyderabad","author":"M. Erdelyi","year":"2011","unstructured":"Erdelyi, M., Garzo, A., Benczur, A.A.: Web spam classification: a few features worth more. In: Joint WICOW\/AIRWeb Workshop on Web Quality In Conjunction with the 20th International World Web Conference in Hyderabad. ACM Press, India (2011)"},{"key":"25_CR12","unstructured":"Gansterer, W., et al.: Anti-spam methods \u2013 state-of-theart. Tech. rep., Institute for Distributed and Multimedia Systems, University of Vienna (2004)"},{"issue":"2","key":"25_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/792550.792553","volume":"36","author":"M.R. Henzinger","year":"2002","unstructured":"Henzinger, M.R., Motwan, R., Silverstein, C.: Challenges in web search engines. SIGIR Forum\u00a036(2), 11\u201322 (2002)","journal-title":"SIGIR Forum"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Hershkop, S., Stolfo, S.J.: Combining email models for false positive reduction. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, pp. 98\u2013107 (2005)","DOI":"10.1145\/1081870.1081885"},{"issue":"4","key":"25_CR15","doi-asserted-by":"publisher","first-page":"3899","DOI":"10.1016\/j.eswa.2011.06.033","volume":"39","author":"I. Kang","year":"2012","unstructured":"Kang, I., Jeong, M.K., Kong, D.: A differentiated one-class classification method with applications to intrusion detection. Expert Systems with Applications\u00a039(4), 3899\u20133905 (2012)","journal-title":"Expert Systems with Applications"},{"key":"25_CR16","series-title":"LNCS(LNAI)","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1007\/978-3-642-28931-6_56","volume-title":"Hybrid Artificial Intelligent Systems","author":"B. Krawczyk","year":"2012","unstructured":"Krawczyk, B., Wo\u017aniak, M.: Combining Diverse One-Class Classifiers. In: Corchado, E., Sn\u00e1\u0161el, V., Abraham, A., Wo\u017aniak, M., Gra\u00f1a, M., Cho, S.-B. (eds.) HAIS 2012, Part II. LNCS(LNAI), vol.\u00a07209, pp. 590\u2013601. Springer, Heidelberg (2012)"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Kuncheva, L.I.: Combining Pattern Classifiers: Methods and Algorithms. Wiley-Interscience (2004)","DOI":"10.1002\/0471660264"},{"key":"25_CR18","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Hirvitz, E.: A Bayesian approach to filtering junck e-mail, Learning for Text Categorization: paper from the 1998 Workshop. AAAI Technical Report WS-98-05 (1998)"},{"key":"25_CR19","unstructured":"School of Computing, http:\/\/www.comp.dit.ie\/sjdelany\/Dataset.htm"},{"issue":"7","key":"25_CR20","first-page":"925","volume":"20","author":"M. Wo\u017aniak","year":"2010","unstructured":"Wo\u017aniak, M., Zmy\u015blony, M.: Combining classifiers using trained fuser - analytical and experimental results. Neural Network World\u00a020(7), 925\u2013934 (2010)","journal-title":"Neural Network World"},{"issue":"8","key":"25_CR21","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.knosys.2006.05.002","volume":"19","author":"M. Wozniak","year":"2006","unstructured":"Wozniak, M.: Proposition of common classifier construction for pattern recognition with context task. Knowledge-Based Systems\u00a019(8), 617\u2013624 (2006)","journal-title":"Knowledge-Based Systems"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33018-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:03:44Z","timestamp":1743998624000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33018-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642330179","9783642330186"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33018-6_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}