{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:34:54Z","timestamp":1777455294852,"version":"3.51.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,9]],"date-time":"2013-06-09T00:00:00Z","timestamp":1370736000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s10844-013-0254-7","type":"journal-article","created":{"date-parts":[[2013,6,8]],"date-time":"2013-06-08T03:05:37Z","timestamp":1370660737000},"page":"19-45","source":"Crossref","is-referenced-by-count":168,"title":["Cost-sensitive three-way email spam filtering"],"prefix":"10.1007","volume":"42","author":[{"given":"Bing","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yiyu","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Jigang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,9]]},"reference":[{"key":"254_CR1","unstructured":"Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Paliouras, G., Spyropoulos, C.D. (2000). An evaluation of naive Bayesian anti-spam filtering. In Proc. of the workshop on machine learning in the new information age."},{"key":"254_CR2","unstructured":"Barracuda Spam Firewall (2012). From http:\/\/www.barracudanetworks.com . Accessed 25 July 2012."},{"key":"254_CR3","unstructured":"Bogofilter (2012). From http:\/\/bogofilter.sourceforge.net . Accessed 25 July 2012."},{"key":"254_CR4","unstructured":"Cohen, W. (1996). Learning rules that classify email. In Advances in inductive logic programming."},{"key":"254_CR5","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801389","volume-title":"An introduction to support vector machines and other kernel-based learning methods","author":"N Cristianini","year":"2000","unstructured":"Cristianini, N., & Shawe-Taylor, J. (2000). An introduction to support vector machines and other kernel-based learning methods. Cambridge: Cambridge University Press."},{"key":"254_CR6","doi-asserted-by":"crossref","unstructured":"Drummond, C., & Holte, R.C. (2000). Explicitly representing expected cost: an alternative to ROC representation. In KDD 2000 (pp.\u00a0198\u2013207).","DOI":"10.1145\/347090.347126"},{"issue":"1","key":"254_CR7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s10994-006-8199-5","volume":"65","author":"C Drummond","year":"2006","unstructured":"Drummond, C., & Holte, R.C. (2006). Cost curves: an improved method for visualizing classifier performance. Machine Learning, 65(1), 95\u2013130.","journal-title":"Machine Learning"},{"key":"254_CR8","volume-title":"Pattern classification and scene analysis","author":"RO Duda","year":"1973","unstructured":"Duda, R.O., & Hart, P.E. (1973). Pattern classification and scene analysis. New York: Wiley."},{"key":"254_CR9","unstructured":"Elkan, C. (2001). The foundations of cost-senstive learning. In Proceedings of the 17th international joint conference on artificial intelligence (pp.\u00a0973\u2013978)."},{"key":"254_CR10","unstructured":"Fayyad, U.M., & Irani, K.B. (1993). Multi-interval discretization of continuous-valued attributes for classification learning. In Proceedings of the 13th international joint conference on artificial intelligence (pp.\u00a01022\u20131029)."},{"key":"254_CR11","unstructured":"GFI MailEssentials (2012). http:\/\/www.gfi.com\/ . Accessed 25 July 2012."},{"key":"254_CR12","volume-title":"The estimation of probabilities: An essay on modern Bayesian methods","author":"IJ Good","year":"1965","unstructured":"Good, I.J. (1965). The estimation of probabilities: An essay on modern Bayesian methods. Cambridge: MIT Press."},{"key":"254_CR13","unstructured":"Graham, P. (2002). A Plan for spam. http:\/\/www.paulgraham.com\/spam.html . Accessed 25 July 2012."},{"key":"254_CR14","doi-asserted-by":"crossref","unstructured":"Masand, B., Linoff, G., Waltz, D. (1992). Classifying news stories using memory based reasoning. In Proceedings of the 15th annual international ACM SIGIR conference on research and development in information retrieval (pp.\u00a059\u201365).","DOI":"10.1145\/133160.133177"},{"key":"254_CR15","volume-title":"Machine learning","author":"T Mitchell","year":"1997","unstructured":"Mitchell, T. (1997). Machine learning. New York: McGraw Hill."},{"key":"254_CR16","unstructured":"Pantel, P., & Lin, D.K. (1998). SpamCop\u2014a spam classification & organization program. In Proceedings of AAAI workshop on learning for text categorization (pp.\u00a095\u201398). Madison, WI."},{"key":"254_CR17","unstructured":"Rennie, J. (1996). \u201cifile\u201d. http:\/\/people.csail.mit.edu\/jrennie\/ifile\/ . Accessed 25 July 2012."},{"key":"254_CR18","unstructured":"Robinson, G. (2004). A statistical approach to the spam problem, spam detection. In Why Chi? Motivations for the use of fishers inverse Chi-square procedure in spam classification. Handling redundancy in email token probabilities."},{"key":"254_CR19","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E. (1998). A Bayesian approach to filtering junk e-mail. In AAAI workshop on learning for text categorization. AAAI Technical Report WS-98-05, Madison, Wisconsin."},{"issue":"2\/3","key":"254_CR20","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1023\/A:1007649029923","volume":"39","author":"E Schapire","year":"2000","unstructured":"Schapire, E., & Singer, Y. (2000). BoosTexter: a boosting-based system for text categorization. Machine Learning, 39(2\/3), 135\u2013168.","journal-title":"Machine Learning"},{"key":"254_CR21","doi-asserted-by":"crossref","unstructured":"Siersdorfer, S., & Weikum, G. (2005). Using restrictive classification and meta classification for junk elimination. In Proceedings of ECIR\u20192005 (pp.\u00a0287\u2013299).","DOI":"10.1007\/978-3-540-31865-1_21"},{"key":"254_CR22","volume-title":"Elementary statistics","author":"MF Triola","year":"2005","unstructured":"Triola, M.F. (2005). Elementary statistics. Reading: Addison Wesley."},{"key":"254_CR23","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1016\/j.ins.2010.11.019","volume":"181","author":"YY Yao","year":"2011","unstructured":"Yao, Y.Y. (2011). The superiority of three-way decisions in probabilistic rough set models. Information Sciences, 181, 1080\u20131096.","journal-title":"Information Sciences"},{"key":"254_CR24","first-page":"17","volume-title":"Methodologies for intelligent systems Vol.\u00a05","author":"YY Yao","year":"1990","unstructured":"Yao, Y.Y., Wong, S.K.M., Lingras, P. (1990). A decision-theoretic rough set model. In Z.W. Ras, M. Zemankova, M.L. Emrich (Eds.), Methodologies for intelligent systems (Vol.\u00a05, pp.\u00a017\u201324). New York: North Holland.","edition":"5"},{"key":"254_CR26","unstructured":"Yerazunis, W.S. (2003). Sparse binary polynomial hashing and the CRM114 discriminator. In Proceedings of the MIT spam conference."},{"key":"254_CR27","unstructured":"Yih, W., McCann, R., Kolcz, A. (2007). Improving spam filtering by Detecting Gray mail. In Proceedings of the 4th conference on e-mail and anti-spam (CEAS07)."},{"key":"254_CR28","unstructured":"Zhao, W., & Zhang, Z. (2005). An email classification model based on rough set theory. In Procedings of the international conference on active media technology (pp.\u00a0403\u2013408)."},{"issue":"1","key":"254_CR29","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/TKDE.2006.17","volume":"18","author":"ZH Zhou","year":"2006","unstructured":"Zhou, Z.H., & Liu, X.Y. (2006). Training cost-sensitive neural networks with methods addressing the class imbalance problem. IEEE Transactions on Knowledge and Data Engineering, 18(1), 63\u201377.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"254_CR30","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1111\/j.1467-8640.2010.00358.x","volume":"26","author":"ZH Zhou","year":"2010","unstructured":"Zhou, Z.H., & Liu, X.Y. (2010). On multi-class cost-sensitive learning. Computational Intelligence, 26(3), 232\u2013257.","journal-title":"Computational Intelligence"},{"key":"254_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, B., & Liu, Q.Z. (2012). A comparison study of cost-sensitive classifier evaluations. In The 2012 international conference on brain informatics (BI\u201912). Lecture notes in computer science (Vol.\u00a07670, pp.\u00a0360\u2013371).","DOI":"10.1007\/978-3-642-35139-6_34"},{"key":"254_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, B., Yao, Y.Y., Luo, J.G. (2010). A three-way decision approach to email spam filtering. In Proceedings of the 23th Canadian conference on artificial intelligence (AI 2010), University of Ottawa, Ontario, Canada, 31 May\u20132 June 2010. Lecture notes in artificial intelligence (pp.\u00a028\u201339).","DOI":"10.1007\/978-3-642-13059-5_6"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-013-0254-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-013-0254-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-013-0254-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T19:50:43Z","timestamp":1563133843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-013-0254-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,9]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["254"],"URL":"https:\/\/doi.org\/10.1007\/s10844-013-0254-7","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,9]]}}}