{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:19Z","timestamp":1773615739542,"version":"3.50.1"},"reference-count":24,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625701032","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:07Z","timestamp":1771936447000},"page":"1475-1483","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Construction of a Semantic Space of Intentionalities Using Generative Pretrained Models to Solve the Problem of Spam Filtering"],"prefix":"10.3103","volume":"59","author":[{"given":"I. Yu.","family":"Zhukov","sequence":"first","affiliation":[]},{"given":"E. E.","family":"Balashova","sequence":"additional","affiliation":[]},{"given":"A. P.","family":"Mandrov","sequence":"additional","affiliation":[]},{"given":"N. D.","family":"Kravchenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7938_CR1","doi-asserted-by":"publisher","unstructured":"Gadde, S., Lakshmanarao, A., and Satyanarayana, S., SMS spam detection using machine learning and deep learning techniques, 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2021, IEEE, 2021, pp. 358\u2013362. https:\/\/doi.org\/10.1109\/icaccs51430.2021.9441783","DOI":"10.1109\/icaccs51430.2021.9441783"},{"key":"7938_CR2","doi-asserted-by":"publisher","unstructured":"Trivedi, Sh.K., A study of machine learning classifiers for spam detection, 2016 4th International Symposium on Computational and Business Intelligence (ISCBI), Olten, Switzerland, 2016, IEEE, 2016, pp. 176\u2013180. https:\/\/doi.org\/10.1109\/iscbi.2016.7743279","DOI":"10.1109\/iscbi.2016.7743279"},{"key":"7938_CR3","doi-asserted-by":"publisher","first-page":"1862888","DOI":"10.1155\/2022\/1862888","volume":"2022","author":"N. Ahmed","year":"2022","unstructured":"Ahmed, N., Amin, R., Aldabbas, H., Koundal, D., Alouffi, B., and Shah, T., Machine learning techniques for spam detection in email and IoT platforms: Analysis and research challenges, Security and Communication Networks, 2022, vol. 2022, p. 1862888. https:\/\/doi.org\/10.1155\/2022\/1862888","journal-title":"Security and Communication Networks"},{"key":"7938_CR4","doi-asserted-by":"publisher","unstructured":"Kumar, N., Sonowal, S., and Nishant,, Email spam detection using machine learning algorithms, 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 2020, IEEE, 2020, pp. 108\u2013113. https:\/\/doi.org\/10.1109\/icirca48905.2020.9183098","DOI":"10.1109\/icirca48905.2020.9183098"},{"key":"7938_CR5","doi-asserted-by":"publisher","unstructured":"Chetty, G., Bui, H., and White, M., Deep learning based spam detection system, 2019 International Conference on Machine Learning and Data Engineering (iCMLDE), Taipei, Taiwan, 2019, IEEE, 2019, pp. 91\u201396. https:\/\/doi.org\/10.1109\/icmlde49015.2019.00027","DOI":"10.1109\/icmlde49015.2019.00027"},{"key":"7938_CR6","doi-asserted-by":"publisher","first-page":"100079","DOI":"10.1016\/j.osnem.2020.100079","volume":"18","author":"Z. Alom","year":"2020","unstructured":"Alom, Z., Carminati, B., and Ferrari, E., A deep learning model for Twitter spam detection, Online Soc. Networks Media, 2020, vol. 18, p. 100079. https:\/\/doi.org\/10.1016\/j.osnem.2020.100079","journal-title":"Online Soc. Networks Media"},{"key":"7938_CR7","first-page":"359","volume":"3","author":"A.M. Rakhmatillayevich","year":"2025","unstructured":"Rakhmatillayevich, A.M., Glove: Global vectors for word representation, American Journal of Multidisciplinary Bulletin, 2025, vol. 3, no. 5, pp. 359\u2013364.","journal-title":"American Journal of Multidisciplinary Bulletin"},{"key":"7938_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/s1351324916000334","volume":"23","author":"K.W. Church","year":"2017","unstructured":"Church, K.W., Word2Vec, Nat. Lang. Eng., 2017, vol. 23, no. 1, pp. 155\u2013162. https:\/\/doi.org\/10.1017\/s1351324916000334","journal-title":"Nat. Lang. Eng."},{"key":"7938_CR9","doi-asserted-by":"publisher","unstructured":"Qader, W.A., Ameen, M.M., and Ahmed, B.I., An overview of bag of words; importance, implementation, applications, and challenges, 2019 International Engineering Conference (IEC), Erbil, Iraq, 2019, IEEE, 2019, pp.\u00a0200\u2013204. https:\/\/doi.org\/10.1109\/iec47844.2019.8950616","DOI":"10.1109\/iec47844.2019.8950616"},{"key":"7938_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/3538491","volume":"16","author":"C. Oswald","year":"2022","unstructured":"Oswald, C., Simon, S.E., and Bhattacharya, A., SpotSpam: Intention analysis\u2013driven SMS spam detection using BERT embeddings, ACM Trans. Web, 2022, vol. 16, no. 3, p. 14. https:\/\/doi.org\/10.1145\/3538491","journal-title":"ACM Trans. Web"},{"key":"7938_CR11","doi-asserted-by":"publisher","unstructured":"Marin, I.A., Burda, P., Zannone, N., and Allodi, L., The influence of human factors on the intention to report phishing emails, Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, Hamburg, 2023, New York: Association for Computing Machinery, 2023, p. 620. https:\/\/doi.org\/10.1145\/3544548.3580985","DOI":"10.1145\/3544548.3580985"},{"key":"7938_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1038\/s43586-022-00184-w","volume":"2","author":"M. Greenacre","year":"2022","unstructured":"Greenacre, M., Groenen, P.J.F., Hastie, T., D\u2019Enza, A.I., Markos, A., and Tuzhilina, E., Principal component analysis, Nat. Rev. Methods Primers, 2022, vol. 2, no. 1, p. 100. https:\/\/doi.org\/10.1038\/s43586-022-00184-w","journal-title":"Nat. Rev. Methods Primers"},{"key":"7938_CR13","doi-asserted-by":"publisher","first-page":"923464","DOI":"10.3389\/fpsyg.2022.923464","volume":"13","author":"M. Conner","year":"2022","unstructured":"Conner, M. and Norman, P., Understanding the intention-behavior gap: The role of intention strength, Front. Psychol., 2022, vol. 13, p. 923464. https:\/\/doi.org\/10.3389\/fpsyg.2022.923464","journal-title":"Front. Psychol."},{"key":"7938_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1002\/arcp.1061","volume":"4","author":"V.G. Morwitz","year":"2021","unstructured":"Morwitz, V.G. and Munz, K.P., Intentions, Consumer Psychology Review, 2021, vol. 4, no. 1, pp. 26\u201341. https:\/\/doi.org\/10.1002\/arcp.1061","journal-title":"Consumer Psychology Review"},{"key":"7938_CR15","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K., BERT: Pre-training of deep bidirectional transformers for language understanding, Proceedings of the North American Chapter of the Association for Computational Linguistics (NAACL 2019), Minneapolis, MN, 2019, Burstein, J., Doran, Ch., and Solorio, T., Eds., 2019, vol. 1, pp. 4171\u20134186. https:\/\/doi.org\/10.18653\/v1\/N19-1423","DOI":"10.18653\/v1\/N19-1423"},{"key":"7938_CR16","doi-asserted-by":"publisher","unstructured":"Jiao, X., Yin, Yi., Shang, L., Jiang, X., Chen, X., Li, L., Wang, F., and Liu, Q., TinyBERT: Distilling BERT for natural language understanding, Findings of the Association for Computational Linguistics: EMNLP 2020, Cohn, T., He, Yu., and Liu, Ya., Eds., Association for Computational Linguistics, 2020, pp. 4163\u20134174. https:\/\/doi.org\/10.18653\/v1\/2020.findings-emnlp.372","DOI":"10.18653\/v1\/2020.findings-emnlp.372"},{"key":"7938_CR17","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., and Polosukhin, I., Attention is all you need, 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, 2017, 2017."},{"key":"7938_CR18","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Improved Adam optimizer for deep neural networks, 2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS), Banff, Canada, 2018, IEEE, 2018, pp. 1\u20132. https:\/\/doi.org\/10.1109\/iwqos.2018.8624183","DOI":"10.1109\/iwqos.2018.8624183"},{"key":"7938_CR19","unstructured":"Schmidt, R.M., Schneider, F., and Hennig, P., Descending through a crowded valley-benchmarking deep learning optimizers, International Conference on Machine Learning, PMLR, 2021, pp. 9367\u20139376."},{"key":"7938_CR20","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1137\/19m1263443","volume":"31","author":"A. Barakat","year":"2021","unstructured":"Barakat, A. and Bianchi, P., Convergence and dynamical behavior of the Adam algorithm for nonconvex stochastic optimization, SIAM J. Optim., 2021, vol. 31, no. 1, pp. 244\u2013274. https:\/\/doi.org\/10.1137\/19m1263443","journal-title":"SIAM J. Optim."},{"key":"7938_CR21","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1007\/s12065-022-00795-y","volume":"17","author":"K. Wong","year":"2024","unstructured":"Wong, K., Dornberger, R., and Hanne, T., An analysis of weight initialization methods in connection with different activation functions for feedforward neural networks, Evol. Intell., 2024, vol. 17, no. 3, pp. 2081\u20132089. https:\/\/doi.org\/10.1007\/s12065-022-00795-y","journal-title":"Evol. Intell."},{"key":"7938_CR22","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.neucom.2022.06.111","volume":"503","author":"Sh.R. Dubey","year":"2022","unstructured":"Dubey, Sh.R., Singh, S.K., and Chaudhuri, B.B., Activation functions in deep learning: A comprehensive survey and benchmark, Neurocomputing, 2022, vol. 503, pp. 92\u2013108. https:\/\/doi.org\/10.1016\/j.neucom.2022.06.111","journal-title":"Neurocomputing"},{"key":"7938_CR23","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10588-005-5379-y","volume":"11","author":"P.S. Keila","year":"2005","unstructured":"Keila, P.S. and Skillicorn, D.B., Structure in the Enron email dataset, Comput. Math. Organ. Theory, 2005, vol.\u00a011, no. 3, pp. 183\u2013199. https:\/\/doi.org\/10.1007\/s10588-005-5379-y","journal-title":"Comput. Math. Organ. Theory"},{"key":"7938_CR24","doi-asserted-by":"publisher","unstructured":"Almeida, T.A., Hidalgo, J.M.G., and Yamakami, A., Contributions to the study of SMS spam filtering, Proceedings of the 11th ACM symposium on Document engineering, Mountain View, CA, 2011, New York: Association for Computing Machinery, 2011, pp. 259\u2013262. https:\/\/doi.org\/10.1145\/2034691.2034742","DOI":"10.1145\/2034691.2034742"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701032.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625701032","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701032.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:57Z","timestamp":1773612237000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625701032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7938"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625701032","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"29 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}