{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:57:08Z","timestamp":1773482228601,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s41060-025-00887-9","type":"journal-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T07:00:46Z","timestamp":1764313246000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An accurate spam email detection mechanism using XLNet"],"prefix":"10.1007","volume":"21","author":[{"given":"Neeraj","family":"Shrestha","sequence":"first","affiliation":[]},{"given":"Jared","family":"Oluoch","sequence":"additional","affiliation":[]},{"given":"Weiqing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Junghwan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Eralda","family":"Caushaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"887_CR1","unstructured":"Cveti\u0107anin, N.: What\u2019s On the Other Side of Your Inbox\u201320 SPAM Statistics for 2021. (2021)"},{"key":"887_CR2","unstructured":"O\u2019Shea, K., Nash, R.: An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015)"},{"key":"887_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky, A.: Fundamentals of recurrent neural network (rnn) and long short-term memory (lstm) network. Phys. D 404, 132306 (2020)","journal-title":"Phys. D"},{"key":"887_CR4","first-page":"40","volume":"30","author":"A Vaswani","year":"2017","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141, Polosukhin, I.: Attention is all you need. Adv. Neural Inform. Process. Syst. 30, 40 (2017)","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"887_CR5","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"887_CR6","unstructured":"Yang, Z., Dai, Z., Yang, Y., Carbonell, J., Salakhutdinov, R.R., Le, Q.V.: Xlnet: Generalized autoregressive pretraining for language understanding. Advances in neural information processing systems 32 (2019)"},{"key":"887_CR7","doi-asserted-by":"crossref","unstructured":"Dai, Z., Yang, Z., Yang, Y., Carbonell, J., Le, Q.V., Salakhutdinov, R.: Transformer-xl: Attentive language models beyond a fixed-length context. arXiv preprint arXiv:1901.02860 (2019)","DOI":"10.18653\/v1\/P19-1285"},{"key":"887_CR8","unstructured":"Foundation, A.S.: SpamAssassin. Last accessed 7 February 2023 (2003). https:\/\/spamassassin.apache.org\/old\/publiccorpus"},{"key":"887_CR9","doi-asserted-by":"crossref","unstructured":"Klimt, B., Yang, Y.: The enron corpus: A new dataset for email classification research. In: Machine Learning: ECML 2004: 15th European Conference on Machine Learning, Pisa, Italy, September 20-24, 2004. Proceedings 15, pp. 217\u2013226 (2004). Springer","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"887_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1023\/A:1022948414856","volume":"6","author":"G Sakkis","year":"2003","unstructured":"Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C.D., Stamatopoulos, P.: A memory-based approach to anti-spam filtering for mailing lists. Inf. Retrieval 6, 49\u201373 (2003)","journal-title":"Inf. Retrieval"},{"issue":"6","key":"887_CR11","doi-asserted-by":"publisher","first-page":"01802","DOI":"10.1016\/j.heliyon.2019.e01802","volume":"5","author":"EG Dada","year":"2019","unstructured":"Dada, E.G., Bassi, J.S., Chiroma, H., Adetunmbi, A.O., Ajibuwa, O.E., et al.: Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6), 01802 (2019)","journal-title":"Heliyon"},{"key":"887_CR12","doi-asserted-by":"publisher","first-page":"93048","DOI":"10.1109\/ACCESS.2023.3309697","volume":"11","author":"K Hasib","year":"2023","unstructured":"Hasib, K., Azam, S., Karim, A., Marouf, A., Shamrat, F.M., Montaha, S., Yeo, K.C., Jonkman, M., Alhajj, R., Rokne, J.: Mcnn-lstm: combining cnn and lstm to classify multi-class text in imbalanced news data. IEEE Access 11, 93048\u201393063 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3309697","journal-title":"IEEE Access"},{"issue":"1","key":"887_CR13","doi-asserted-by":"publisher","first-page":"893","DOI":"10.12785\/ijcds\/110173","volume":"11","author":"K Iqbal","year":"2022","unstructured":"Iqbal, K., A Khan, S., Anisa, S., Tasneem, A., Mohammad, N.: A preliminary study on personalized spam e-mail filtering using bidirectional encoder representations from transformers (bert) and tensorflow 2.0. Int. J. Comput. Digit. Syst. 11(1), 893\u2013903 (2022)","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"887_CR14","unstructured":"Sahmoud, T., Mikki, D., et al.: Spam detection using bert. arXiv preprint arXiv:2206.02443 (2022)"},{"key":"887_CR15","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1016\/j.procs.2021.03.107","volume":"184","author":"Q Yaseen","year":"2021","unstructured":"Yaseen, Q., et al.: Spam email detection using deep learning techniques. Proc. Comput. Sci. 184, 853\u2013858 (2021)","journal-title":"Proc. Comput. Sci."},{"key":"887_CR16","doi-asserted-by":"crossref","unstructured":"Tida, V.S., Hsu, S.: Universal spam detection using transfer learning of bert model. arXiv preprint arXiv:2202.03480 (2022)","DOI":"10.24251\/HICSS.2022.921"},{"key":"887_CR17","doi-asserted-by":"crossref","unstructured":"Wolf, T., Debut, L., Sanh, V., Chaumond, J., Delangue, C., Moi, A., Cistac, P., Rault, T., Louf, R., Funtowicz, M., et al.: Huggingface\u2019s transformers: State-of-the-art natural language processing. arXiv preprint arXiv:1910.03771 (2019)","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"887_CR18","doi-asserted-by":"crossref","unstructured":"Zavrak, S., Yilmaz, S.: Email spam detection using hierarchical attention hybrid deep learning method. arXiv preprint arXiv:2204.07390 (2022)","DOI":"10.21203\/rs.3.rs-1393162\/v1"},{"key":"887_CR19","doi-asserted-by":"crossref","unstructured":"Guo, Y., Mustafaoglu, Z., Koundal, D.: Spam detection using bidirectional transformers and machine learning classifier algorithms. Journal of Computational and Cognitive Engineering (2022)","DOI":"10.47852\/bonviewJCCE2202192"},{"key":"887_CR20","doi-asserted-by":"crossref","unstructured":"Wang, C., Li, Q., Ren, T.-Y., Wang, X.-H., Guo, G.-x,: High efficiency spam filtering: a manifold learning-based approach. Math. Problems Eng. 2021, 1\u20137 (2021)","DOI":"10.1155\/2021\/2993877"},{"key":"887_CR21","doi-asserted-by":"crossref","unstructured":"Gupta, A., Patil, J., Soni, S., Rajan, A.: Email spam detection using multi-head cnn-bigru network. In: Advanced Network Technologies and Intelligent Computing: Second International Conference, ANTIC 2022, Varanasi, India, December 22\u201324, 2022, Proceedings, Part I, pp. 29\u201346 (2023). Springer","DOI":"10.1007\/978-3-031-28180-8_3"},{"key":"887_CR22","doi-asserted-by":"crossref","unstructured":"Islam, M.K., Al\u00a0Amin, M., Islam, M.R., Mahbub, M.N.I., Showrov, M.I.H., Kaushal, C.: Spam-detection with comparative analysis and spamming words extractions. In: 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 1\u20139 (2021). IEEE","DOI":"10.1109\/ICRITO51393.2021.9596218"},{"key":"887_CR23","first-page":"2","volume":"10","author":"S Douzi","year":"2020","unstructured":"Douzi, S., AlShahwan, F.A., Lemoudden, M., El Ouahidi, B.: Hybrid email spam detection model using artificial intelligence. Int. J. Mach. Learn. Comput. 10, 2 (2020)","journal-title":"Int. J. Mach. Learn. Comput."},{"key":"887_CR24","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter. arXiv preprint arXiv:1910.01108 (2019)"},{"key":"887_CR25","doi-asserted-by":"crossref","unstructured":"Conneau, A., Khandelwal, K., Goyal, N., Chaudhary, V., Wenzek, G., Guzm\u00e1n, F., Grave, E., Ott, M., Zettlemoyer, L., Stoyanov, V.: Unsupervised cross-lingual representation learning at scale. arXiv preprint arXiv:1911.02116 (2019)","DOI":"10.18653\/v1\/2020.acl-main.747"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00887-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-025-00887-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00887-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:36:30Z","timestamp":1773480990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-025-00887-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["887"],"URL":"https:\/\/doi.org\/10.1007\/s41060-025-00887-9","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,28]]},"assertion":[{"value":"11 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"21"}}