{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:19:04Z","timestamp":1732771144856,"version":"3.29.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,19]]},"DOI":"10.1109\/sisy62279.2024.10737559","type":"proceedings-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T18:29:39Z","timestamp":1730831379000},"page":"000227-000232","source":"Crossref","is-referenced-by-count":0,"title":["Spam Filter Using Artificial Intelligence: PyTorch Framework Based Approach"],"prefix":"10.1109","author":[{"given":"Bal\u00e1zs","family":"T\u00f3th","sequence":"first","affiliation":[{"name":"&#x00D3;buda University,John von Neumann Faculty of Informatics,Budapest,Hungary"}]},{"given":"Szandra Anna","family":"Laczi","sequence":"additional","affiliation":[{"name":"Doctoral School of Applied Informatics and Applied Mathematics, Obuda University,Budapest,Hungary"}]},{"given":"Val\u00e9ria","family":"P\u00f3ser","sequence":"additional","affiliation":[{"name":"Biomatics and Applied Intelligence Institution, &#x00D3;buda University,John von Neumann Faculty of Informatics,Budapest,Hungary"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TELSIKS52058.2021.9606348"},{"volume-title":"PyTorch vs Tensorflow vs Keras","key":"ref2"},{"volume-title":"Spam Statistics 2024: Survey on Junk Email, AI Scams & Phishing","key":"ref3"},{"volume-title":"Linear - PyTorch 2.1 documentation","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DCAS.2018.8620116"},{"volume-title":"Dropout - PyTorch 2.1 documentation","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.10.2022.10.9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RICAI60863.2023.10489076"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU50717.2020.9259896"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS45141.2019.9065686"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2022.0369"},{"volume-title":"Email classification","year":"2021","key":"ref12"},{"volume-title":"SMS spam collection - UCI Machine Learning Repository","key":"ref13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.10.2022.10.10"}],"event":{"name":"2024 IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY)","start":{"date-parts":[[2024,9,19]]},"location":"Pula, Croatia","end":{"date-parts":[[2024,9,21]]}},"container-title":["2024 IEEE 22nd Jubilee International Symposium on Intelligent Systems and Informatics (SISY)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10737504\/10737506\/10737559.pdf?arnumber=10737559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:39:06Z","timestamp":1732693146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10737559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,19]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/sisy62279.2024.10737559","relation":{},"subject":[],"published":{"date-parts":[[2024,9,19]]}}}