{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:34:07Z","timestamp":1761597247141},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1007\/s10462-010-9198-2","type":"journal-article","created":{"date-parts":[[2010,12,31]],"date-time":"2010-12-31T11:40:08Z","timestamp":1293795608000},"page":"369-382","source":"Crossref","is-referenced-by-count":18,"title":["BSPNN: boosted subspace probabilistic neural network for email security"],"prefix":"10.1007","volume":"35","author":[{"given":"Tich Phuoc","family":"Tran","sequence":"first","affiliation":[]},{"given":"Thi Thanh Sang","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Poshiang","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Xiaoying","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,1]]},"reference":[{"key":"9198_CR1","unstructured":"Androutsopoulos I, Koutsias J, Chandrinos KV, Paliouras G, Spyropoulos CD (2000) An evaluation of naive Bayesian anti-spam filtering. In: Proceedings of the ECML, Barcelona, Spain"},{"key":"9198_CR2","unstructured":"Carreras X, Marquez L (2001) Boosting trees for anti-spam email filtering. In: RANLP, Tzigov Chark, Bulgaria"},{"key":"9198_CR3","doi-asserted-by":"crossref","unstructured":"Dhinakaran C, Lee JK, Nagamalai D (2007) Characterizing spam traffic and spammers. In: International conference on convergence information technology, pp 831\u2013836","DOI":"10.1109\/ICCIT.2007.89"},{"key":"9198_CR4","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1023\/A:1007607513941","volume":"40","author":"TG Dietterich","year":"2000","unstructured":"Dietterich TG (2000) An experimental comparison of three methods for constricting ensembles of decision trees: bagging, boosting and randomization. Mach Learn 40: 139\u2013158","journal-title":"Mach Learn"},{"key":"9198_CR5","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire R (1997) A decision-theoretic generation of on-line learning and an application to boosting. J Comput Syst Sci 55: 119\u2013139","journal-title":"J Comput Syst Sci"},{"key":"9198_CR6","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman J, Hastie T, Tibshirani R (2000) Additive logistic regression: a statistical view of boosting. Ann Stat 28: 337\u2013407","journal-title":"Ann Stat"},{"key":"9198_CR7","doi-asserted-by":"crossref","unstructured":"Guruswami V, Sahai A (1999) Multiclass learning, boosting, and error-correcting codes. In: Proceedings of 12th annual conference on computational learning theory, pp 145\u2013155","DOI":"10.1145\/307400.307429"},{"key":"9198_CR8","volume-title":"Neural networks and learning machines","author":"S Haykin","year":"2008","unstructured":"Haykin S (2008) Neural networks and learning machines. 3rd edn. Prentice Hall, Englewood Cliffs","edition":"3"},{"key":"9198_CR9","doi-asserted-by":"crossref","unstructured":"Huang J, Ertekin S, Song Y, Zha H, Giles CL (2007) Efficient multiclass boosting classification with active learning. In: ICDM","DOI":"10.1137\/1.9781611972771.27"},{"key":"9198_CR10","doi-asserted-by":"crossref","unstructured":"Issac B, Jap WJ, Sutanto JH (2009) Improved Bayesian anti-spam filter implementation and analysis on independent spam corpuses. In: International conference on computer engineering and technology, pp 326\u2013330","DOI":"10.1109\/ICCET.2009.170"},{"key":"9198_CR11","unstructured":"Kohavi R, Wolpert D (1996) Bias plus variance decomposition for zero-one loss functions. In: Proceedings of international conference on machine learning, Italy, pp 275\u2013283"},{"key":"9198_CR12","doi-asserted-by":"crossref","DOI":"10.1533\/9780857099440","volume-title":"Machine learning and data mining: introduction to principles and algorithms","author":"I Kononenko","year":"2007","unstructured":"Kononenko I, Kukar M (2007) Machine learning and data mining: introduction to principles and algorithms. Horwood Publishing Limited, Chichester"},{"key":"9198_CR13","doi-asserted-by":"crossref","unstructured":"Lin C-H, Liu J-C, Ho C-H (2008) Anomaly detection using LibSVM training tools. In: International conference on information security and assurance","DOI":"10.1109\/ISA.2008.12"},{"key":"9198_CR14","unstructured":"Saiful Islam M, Khaled SM, Farhan K, Abdur Rahman M, Rahman J (2009) Modeling spammer behavior: na\u00efve Bayes vs. artificial neural networks. In: International conference on information and multimedia technology, pp 52\u201355"},{"key":"9198_CR15","unstructured":"Sakkis G, Androutsopoulos I, Paliouras G, Karkaletsis V, Spyropoulos CD, Stamatopoulos P (2001) Stacking classifiers for anti-spam filtering of e-mail. In: Proceedings of EMNLP"},{"key":"9198_CR16","doi-asserted-by":"crossref","unstructured":"Sakkis G, Androutsopoulos I, Paliouras G, Karkaletsis V, Spyropoulos CD, Stamatopoulos P (2003) A memory-based approach to anti-spam filtering for mailing lists. In: Information retrieval, vol 6. Kluwer Publishing, pp 49\u201373","DOI":"10.1023\/A:1022948414856"},{"key":"9198_CR17","unstructured":"Schapire R (1997) Using output codes to boost multiclass learning problems. In: Proceedings of ICML, pp 313\u2013321"},{"key":"9198_CR18","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/72.97934","volume":"2","author":"DF Spetch","year":"1991","unstructured":"Spetch DF (1991) A general regression neural network. IEEE Trans Neural Netw 2: 568\u2013576","journal-title":"IEEE Trans Neural Netw"},{"key":"9198_CR19","doi-asserted-by":"crossref","unstructured":"Uemura M, Tabata T (2008) Design and evaluation of a Bayesian-filter-based image spam filtering method. In: International conference on information security and assurance, pp 46\u201351","DOI":"10.1109\/ISA.2008.84"},{"key":"9198_CR20","volume-title":"Data mining: practical machine learning tools and techniques with Java implementations","author":"IH Witten","year":"2000","unstructured":"Witten IH, Frank E (2000) Data mining: practical machine learning tools and techniques with Java implementations. Morgan Kaufmann, San Francisco"},{"key":"9198_CR21","doi-asserted-by":"crossref","first-page":"1980","DOI":"10.1109\/78.700969","volume":"46","author":"A Zaknich","year":"1998","unstructured":"Zaknich A (1998) Introduction to the modified probabilistic neural network for general signal processing applications. IEEE Trans Signal Process 46: 1980\u20131990","journal-title":"IEEE Trans Signal Process"},{"key":"9198_CR22","doi-asserted-by":"crossref","DOI":"10.1142\/5220","volume-title":"Neural networks for intelligent signal processing","author":"A Zaknich","year":"2003","unstructured":"Zaknich A (2003) Neural networks for intelligent signal processing. World Scientific Publishing, Sydney"},{"key":"9198_CR23","doi-asserted-by":"crossref","unstructured":"Zhang W, Tong R, Dong J (2008) Z-AdaBoost: boosting 2-thresholded weak classifiers for object detection. In: Second international symposium on intelligent information technology application, vol 2, pp 839\u2013844","DOI":"10.1109\/IITA.2008.147"},{"key":"9198_CR24","first-page":"1290","volume":"2","author":"J Zhu","year":"2005","unstructured":"Zhu J, Rosset S, Zhou H, Hastie T (2005) Multiclass adaboost. Ann Appl Stat 2: 1290\u20131306","journal-title":"Ann Appl Stat"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-010-9198-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-010-9198-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-010-9198-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T12:58:22Z","timestamp":1559912302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-010-9198-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["9198"],"URL":"https:\/\/doi.org\/10.1007\/s10462-010-9198-2","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}