{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:12:07Z","timestamp":1729627927175,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ijcnn.2015.7280346","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T17:48:02Z","timestamp":1443721682000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Variable length concentration based feature construction method for spam detection"],"prefix":"10.1109","author":[{"given":"Yang","family":"Gao","sequence":"first","affiliation":[]},{"given":"Guyue","family":"Mi","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"DEMOKRITOS","author":"androutsopoulos","year":"2004","journal-title":"Learning to Filter Unsolicited Commercial E-mail"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178651"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-009-0440-2"},{"key":"ref12","first-page":"1","article-title":"Extracting discriminative information from email for spam detection inspired by immune system","author":"zhu","year":"2010","journal-title":"Evolutionary Computation (CEC) 2010 IEEE Congress on"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2103060"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6707020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6706876"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11857-4_26"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.037"},{"key":"ref18","article-title":"Sparse binary polynomial hashing and the crm114 discriminator","volume":"1","author":"yerazunis","year":"2003","journal-title":"2003 Cambridge Spam Conference Proceedings"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30116-5_38"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref4","first-page":"98","article-title":"A bayesian approach to filtering junk e-mail","volume":"62","author":"sahami","year":"1998","journal-title":"Learning for Text Categorization Papers from the 1998 Workshop"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref3","article-title":"Spam, spammers, and spam control: A white paper by ferris research","author":"research","year":"2009","journal-title":"Tech Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9109-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.07.018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.152"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.03.002"},{"journal-title":"Tech Rep","article-title":"Symantec intelligence report: November 2014","year":"2014","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.131"},{"journal-title":"Technical Report 2014","article-title":"Internet threats trend report: July 2014","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329705"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45105-6_28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2007.448"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299566"},{"article-title":"Untersuchungen zu dynamischen neuronalen net-zen","year":"1991","author":"hochreiter","key":"ref26"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24797-2","volume":"385","author":"graves","year":"2012","journal-title":"Supervised sequence labelling with recurrent neural net-works"}],"event":{"name":"2015 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2015,7,12]]},"location":"Killarney, Ireland","end":{"date-parts":[[2015,7,17]]}},"container-title":["2015 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7256526\/7280295\/07280346.pdf?arnumber=7280346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:36:56Z","timestamp":1498235816000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7280346\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2015.7280346","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}