{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:35:26Z","timestamp":1773804926318,"version":"3.50.1"},"reference-count":88,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3196905","type":"journal-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T19:28:55Z","timestamp":1659727735000},"page":"84365-84383","source":"Crossref","is-referenced-by-count":54,"title":["Modified Genetic Algorithm for Feature Selection and Hyper Parameter Optimization: Case of XGBoost in Spam Prediction"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8000-0910","authenticated-orcid":false,"given":"Nazeeh","family":"Ghatasheh","sequence":"first","affiliation":[{"name":"Department of Information Technology, The University of Jordan, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8775-0581","authenticated-orcid":false,"given":"Ismail","family":"Altaharwa","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, The University of Jordan, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6385-1134","authenticated-orcid":false,"given":"Khaled","family":"Aldebei","sequence":"additional","affiliation":[{"name":"Department of Information Technology, The University of Jordan, Aqaba, Jordan"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"UtkMl\u2019s Twitter Spam Detection Competition","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3081479"},{"issue":"1","key":"ref3","first-page":"18","article-title":"Spam identification on Facebook, Twitter and email using machine learning","volume":"6","author":"Chowdhury","year":"2020","journal-title":"Central Eur. Res. J."},{"key":"ref4","volume-title":"Platform Manipulation and Spam Policy","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1531914.1531924"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1817\/1\/012014"},{"key":"ref8","first-page":"1","article-title":"Towards online spam filtering in social networks","volume-title":"Proc. NDSS","volume":"12","author":"Gao"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2020.100079"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.48.3.20627"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.33383\/2019-029"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9486-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.830"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2719-5_46"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2018.8405477"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICITISEE48480.2019.9003903"},{"key":"ref17","first-page":"1","article-title":"Impact of feature selection techniques for tweet sentiment classification","volume-title":"Proc. 28th Int. Flairs Conf.","author":"Prusa"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2019.1582873"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-019-09669-5"},{"key":"ref20","first-page":"1","article-title":"Alleviating data sparsity for Twitter sentiment analysis","volume-title":"Proc. CEUR Workshop","author":"Saif"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIDS.2019.8862033"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0157-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/INDIACom54597.2022.9763279"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2016.553.563"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223410"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1963.1057810"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544600"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2478\/s13531-012-0047-8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2006.880727"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/1099-128X(200009\/12)14:5\/6<643::AID-CEM621>3.0.CO;2-E"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106337"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89197-0_24"},{"key":"ref35","first-page":"1289","article-title":"An extensive empirical study of feature selection metrics for text classification","volume":"3","author":"Forman","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref36","volume-title":"Computer Models in Genetics","author":"Fraser","year":"1970"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.105"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.30"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijiec.2010.03.002"},{"issue":"8","key":"ref40","first-page":"910","article-title":"Quantitative structure-activity relationship studies of 4-imidazolyl-1,4-dihydropyridines as calcium channel blockers","volume":"16","author":"Hadizadeh","year":"2013","journal-title":"Iranian J. Basic Med. Sci."},{"key":"ref41","first-page":"889","article-title":"A genetic algor-ithm-based feature selection","volume":"5","author":"Babatunde","year":"2014","journal-title":"Int. J. Electron. Commun. Comput. Eng."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.05.011"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892852"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.22038\/ijbms.2016.6931"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2013.6466307"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1182100"},{"issue":"6","key":"ref47","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1023\/A:1006624031083","article-title":"Adaptive intrusion detection: A data mining approach","volume":"14","author":"Lee","year":"2000","journal-title":"Artif. Intell. Rev."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1482"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3077295"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2022.100710"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2019.2921961"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114072"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117193"},{"key":"ref55","volume-title":"Benchm-ML","author":"Pafka","year":"2019"},{"key":"ref56","volume-title":"XGBoost Algorithm: Long May She Reign!","author":"Morde","year":"2019"},{"key":"ref57","article-title":"Tree boosting with XGBoost-why does XGBoost win \u2018every\u2019 machine learning competition?","author":"Nielsen","year":"2016"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.petrol.2021.109520"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2022.02.027"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s10064-022-02708-w"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11517-021-02476-x"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.70"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.025"},{"key":"ref64","first-page":"1","article-title":"Predictive accuracy: A misleading performance measure for highly imbalanced data","volume-title":"Proc. SAS Global Forum","volume":"12","author":"Akosa"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"ref66","volume-title":"Introduction to Modern Information Retrieval","author":"Salton","year":"1986"},{"key":"ref67","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2020.106571"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936454"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.00040"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-x_40"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-020-00219-x"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/app10072581"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"},{"key":"ref76","volume-title":"Statistical Methods for Machine Learning: Discover How to Transform Data Into Knowledge with Python","author":"Brownlee","year":"2018"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1002\/9780471462422.eoct979"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1093\/ptj\/77.12.1755"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6909"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.1995.479783"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1002\/0470013192.bsa501"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3538491"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.3102\/1076998619872761"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2766-4_7"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2034691.2034742"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12991-0"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6989"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI53556.2022.9777157"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09851666.pdf?arnumber=9851666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:10:39Z","timestamp":1710382239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9851666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":88,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3196905","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}