{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:28:39Z","timestamp":1760707719632},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T00:00:00Z","timestamp":1159833600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2006,10,20]]},"DOI":"10.1007\/s10044-006-0045-7","type":"journal-article","created":{"date-parts":[[2006,10,2]],"date-time":"2006-10-02T11:04:19Z","timestamp":1159787059000},"page":"339-351","source":"Crossref","is-referenced-by-count":18,"title":["Using online linear classifiers to filter spam emails"],"prefix":"10.1007","volume":"9","author":[{"given":"Bin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Gareth J. F.","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Wenfeng","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,10,3]]},"reference":[{"issue":"8","key":"45_CR1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSPEC.2003.1222047","volume":"40","author":"SJ Vaughan Nichols","year":"2003","unstructured":"Vaughan Nichols SJ (2003) Saving private e-mail. IEEE Spectr 40(8):40\u201344","journal-title":"IEEE Spectr"},{"issue":"10","key":"45_CR2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2004.177","volume":"37","author":"B Whitworth","year":"2004","unstructured":"Whitworth B, Whitworth E (2004) Spam and the social-technical gap. IEEE Comput 37(10):37\u201345","journal-title":"IEEE Comput"},{"key":"45_CR3","unstructured":"Hoffman P, Crocker D (1998) Unsolicited bulk email: mechanisms for control. Technical Report Report UBE-SOL, IMCR-008, Internet Mail Consortium"},{"key":"45_CR4","unstructured":"Androutsopoulos I, Paliouras G, Karkaletsis V, Sakkis G, Spyropoulos CD, Stamatopoulos P (2000) Learning to filter spam e-mail: a comparison of a Naive Bayesian and a memory-based approach. In: Proceedings of the 4th European conference on principles and practice of knowledge discovery in databases, pp 1\u201313"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Cohen W (1995) Fast effective rule induction. In: Machine learning: Proceedings of the 12th international conference, pp 115\u2013123","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"issue":"5","key":"45_CR6","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","volume":"20","author":"H Drucker","year":"1999","unstructured":"Drucker H, Wu D, Vapnik VN (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 20(5):1048\u20131054","journal-title":"IEEE Trans Neural Netw"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Hidalgo JMG (2002) Evaluating cost-sensitive unsolicited bulk email categorization. In: Proceedings of ACM symposium on applied computing, pp 615\u2013620","DOI":"10.1145\/508791.508911"},{"key":"45_CR8","unstructured":"Yang L, Xiaoping D, Ping L, Zhihui H, Chen G, Huanlin L (2002) Intelligently analyzing and filtering spam emails based on rough set. In: Proceedings of 12th Chinese computer society conference on network and data communication, pp 211\u2013215"},{"key":"45_CR9","unstructured":"Sahami M, Dumais S, Heckerman D, Horvitz E (1998) A Bayesian approach to filtering junk e-mail. In: Proceedings of AAAI workshop on learning for text categorization, pp 55\u201362"},{"key":"45_CR10","unstructured":"Androutsopoulos I, Koutsias J, Chandrinos KV, Spyropoulos CD (2000) An experimental comparison of Naive Bayesian and keyword-based anti-spam filtering with encrypted personal e-mail messages. In: Proceedings of the 23rd annual international ACM SIGIR conference on research and development in information retrieval, pp 160\u2013167"},{"key":"45_CR11","unstructured":"Androutsopoulos I, Koutsias J, Chandrinos KV, Paliouras G, Spyropoulos CD (2000) An evaluation of Naive Bayesian anti-spam filtering. In: Proceedings of the workshop on machine learning in the new information age, 11th European conference on machine learning, pp 9\u201317"},{"key":"45_CR12","unstructured":"Androutsopoulos I, Paliouras G, Michelakis E (2004) Learning to filter unsolicited commercial e-mail. Technical report 2004\/2, NCSR \u201cDemokritos\u201d"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Schneider K (2003) A comparison of event models for Naive Bayes anti-spam e-mail filtering. In: Proceedings of the 10th conference of the European chapter of the association for computational linguistics, pp 307\u2013314","DOI":"10.3115\/1067807.1067848"},{"key":"45_CR14","unstructured":"Carreras X, Marquez L (2001) Boosting trees for anti-spam email filtering. In: Proceedings of European conference on recent advances in NLP, pp 58\u201364"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Lewis DD, Schapire RE, Callan JP, Papka R (1996) Training algorithms for linear text classifiers. In: Proceedings of the 19th annual international conference on research and development in information retrieval, pp 298\u2013306","DOI":"10.1145\/243199.243277"},{"key":"45_CR16","unstructured":"Rocchio J (1971) Relevance feedback in information retrieval. In: The SMART retrieval system: experiments in automatic document processing, pp 313\u2013323. Prentice Hall Inc., Englewood Cliffs"},{"key":"45_CR17","doi-asserted-by":"crossref","unstructured":"Rosenblatt E (1988) The perceptron: a probabilistic model for information storage and organization in the brain. Psych Rev 65(1958):386\u2013407; reprinted in: Neurocomputing (MIT Press, Cambridge, 1988)","DOI":"10.1037\/h0042519"},{"issue":"4","key":"45_CR18","first-page":"285","volume":"2","author":"N Littlestone","year":"1988","unstructured":"Littlestone N (1988) Learning quickly when irrelevant attributes abound: a new linear-threshold algorithm. Mach Learn 2(4):285\u2013318","journal-title":"Mach Learn"},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Grove AJ, Littlestone N, Schuurmans D (1997) General convergence results for linear discriminant updates. In: Annual workshop on computational learning theory, Proceedings of the 10th annual conference on computational learning theory, pp 171\u2013183","DOI":"10.1145\/267460.267493"},{"key":"45_CR20","unstructured":"Dagan I, Karov Y, Roth D (1997) Mistake-driven learning in text categorization. In: Proceedings of the 2nd conference on empirical methods in natural language processing, pp 55\u201363"},{"key":"45_CR21","unstructured":"Ng HT, Goh WB, Low KL (1997) Feature selection, perceptron learning, and a usability case study for text categorization. In: Proceedings of the 20th ACM international conference on research and development in information retrieval, pp 67\u201373"},{"key":"45_CR22","first-page":"703","volume":"13","author":"T Zhang","year":"2001","unstructured":"Zhang T (2001) Regularized Winnow methods. Adv Neural Inf Process Syst 13:703\u2013709","journal-title":"Adv Neural Inf Process Syst"},{"issue":"1\u20132","key":"45_CR23","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/S0004-3702(97)00039-8","volume":"97","author":"J Kivinen","year":"1997","unstructured":"Kivinen J, Warmuth MK, Auer P (1997) The Perceptron algorithm versus Winnow: linear versus logarithmic mistake bounds when few input variables are relevant. Artif Intell 97(1\u20132):325\u2013343","journal-title":"Artif Intell"},{"key":"45_CR24","doi-asserted-by":"crossref","unstructured":"Bel N, Koster CHA, Villegas M (2003) Cross-lingual text categorization. In: Proceedings the 7th European conference on digital library, LNCS 2769, pp 126\u2013139. Springer, Berlin Heidelberg New York","DOI":"10.1007\/978-3-540-45175-4_13"},{"key":"45_CR25","unstructured":"Liere R, Tadepalli P (1998) Active learning with committees in text categorization: preliminary results in comparing winnow and perceptron. In: Learning for text categorization, technical report WS-98-05. AAAI Press, Menlo Park"},{"key":"45_CR26","doi-asserted-by":"crossref","unstructured":"Sch\u00fctze H, Hull DA, Pedersen JO (1995) A comparison of classifiers and document representations for the routing problem. In: Proceedings of the 18th ACM international conference on research and development in information retrieval, pp 229\u2013237","DOI":"10.1145\/215206.215365"},{"key":"45_CR27","unstructured":"Wiener ED, Pedersen JO, Weigend AS (1995) A neural network approach to topic spotting. In: Proceedings of the 4th annual symposium on document analysis and information retrieval, pp 317\u2013332"},{"key":"45_CR28","unstructured":"Yang Y, Pedersen JP (1997) A comparative study on feature selection in text categorization. In: Proceedings of the 14th international conference on machine learning, pp 412\u2013420"},{"key":"45_CR29","unstructured":"Xu H, Yang Z, Wang B, Liu B, Cheng J, Liu Y, Yang Z, Cheng X, Bai S (2002) TREC 11 experiments at CAS-ICT: filtering and web. In: Proceedings of the 11th text retrieval conference, pp 105\u2013115"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0045-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-006-0045-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0045-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,18]],"date-time":"2020-04-18T11:14:59Z","timestamp":1587208499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-006-0045-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,3]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,10,20]]}},"alternative-id":["45"],"URL":"https:\/\/doi.org\/10.1007\/s10044-006-0045-7","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10,3]]}}}