{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:15:49Z","timestamp":1732770949935,"version":"3.29.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724121","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Examining the Efficiency of Various Classification Algorithms in Spam Detection Datasets"],"prefix":"10.1109","author":[{"given":"Mohd.","family":"Umar","sequence":"first","affiliation":[{"name":"Pranveer Singh Institute of Technology,Department of Computer Science and Engineering,Kanpur,India"}]},{"given":"Mahima","family":"Gupta","sequence":"additional","affiliation":[{"name":"Pranveer Singh Institute of Technology,Department of Computer Science and Engineering,Kanpur,India"}]},{"given":"Rishabh","family":"Didwania","sequence":"additional","affiliation":[{"name":"Pranveer Singh Institute of Technology,Department of Computer Science and Engineering,Kanpur,India"}]},{"given":"Rajat","family":"Verma","sequence":"additional","affiliation":[{"name":"Pranveer Singh Institute of Technology,Department of Computer Science and Engineering,Kanpur,India"}]},{"given":"Namrata","family":"Dhanda","sequence":"additional","affiliation":[{"name":"Amity University,Department of Computer Science and Engineering,Lucknow,Uttar Pradesh,India"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"39","article-title":"Evaluation of classification models in ML","volume":"7","author":"Novakovi\u0107","year":"2017","journal-title":"Theory and Applications of Mathematics & Computer Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/aab2f2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115742"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.08.024"},{"issue":"12","key":"ref5","first-page":"18691882","article-title":"Overview of textual anti-spam filtering techniques","volume":"5","author":"Subramaniam","year":"2010","journal-title":"Int. J. Phys. Sci"},{"key":"ref6","first-page":"1122","article-title":"Robust decision trees against adversarial examples","volume-title":"In International Conference on ML","author":"Chen"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/life13030691"},{"key":"ref8","first-page":"155164","article-title":"Fake news detection using passiveaggressive classifier","volume-title":"In Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020","author":"Gupta"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17010049"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.38094\/jastt20165"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s41324-020-00378-y"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.150"},{"issue":"6","key":"ref14","first-page":"509","article-title":"Fake news detection using ML algorithms","volume":"8","author":"Sharma","year":"2020","journal-title":"International Journal of Creative Research Thoughts (IJCRT)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/molecules26041111"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09814-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376177"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/southeastcon42311.2019.9020530"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724121.pdf?arnumber=10724121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:15:20Z","timestamp":1732688120000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724121\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724121","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}