{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:07:00Z","timestamp":1772726820833,"version":"3.50.1"},"reference-count":42,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Zayed University","award":["R21092"],"award-info":[{"award-number":["R21092"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Spam emails have become a pervasive issue in recent years, as internet users receive increasing amounts of unwanted or fake emails. To combat this issue, automatic spam detection methods have been proposed, which aim to classify emails into spam and non-spam categories. Machine learning techniques have been utilized for this task with considerable success. In this paper, we introduce a novel approach to spam email detection by presenting significant advancements to the Dandelion Optimizer (DO) algorithm. The DO is a relatively new nature-inspired optimization algorithm inspired by the flight of dandelion seeds. While the DO shows promise, it faces challenges, especially in high-dimensional problems such as feature selection for spam detection. Our primary contributions focus on enhancing the DO algorithm. Firstly, we introduce a new local search algorithm based on flipping (LSAF), designed to improve the DO\u2019s ability to find the best solutions. Secondly, we propose a reduction equation that streamlines the population size during algorithm execution, reducing computational complexity. To showcase the effectiveness of our modified DO algorithm, which we refer to as the Improved DO (IDO), we conduct a comprehensive evaluation using the Spam base dataset from the UCI repository. However, we emphasize that our primary objective is to advance the DO algorithm, with spam email detection serving as a case study application. Comparative analysis against several popular algorithms, including Particle Swarm Optimization (PSO), the Genetic Algorithm (GA), Generalized Normal Distribution Optimization (GNDO), the Chimp Optimization Algorithm (ChOA), the Grasshopper Optimization Algorithm (GOA), Ant Lion Optimizer (ALO), and the Dragonfly Algorithm (DA), demonstrates the superior performance of our proposed IDO algorithm. It excels in accuracy, fitness, and the number of selected features, among other metrics. Our results clearly indicate that the IDO overcomes the local optima problem commonly associated with the standard DO algorithm, owing to the incorporation of LSAF and the reduction in equation methods. In summary, our paper underscores the significant advancement made in the form of the IDO algorithm, which represents a promising approach for solving high-dimensional optimization problems, with a keen focus on practical applications in real-world systems. While we employ spam email detection as a case study, our primary contribution lies in the improved DO algorithm, which is efficient, accurate, and outperforms several state-of-the-art algorithms in various metrics. This work opens avenues for enhancing optimization techniques and their applications in machine learning.<\/jats:p>","DOI":"10.3390\/computers12100196","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T02:47:30Z","timestamp":1695955650000},"page":"196","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An Improved Dandelion Optimizer Algorithm for Spam Detection: Next-Generation Email Filtering System"],"prefix":"10.3390","volume":"12","author":[{"given":"Mohammad","family":"Tubishat","sequence":"first","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi P.O. Box 144534, United Arab Emirates"}]},{"given":"Feras","family":"Al-Obeidat","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi P.O. Box 144534, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5746-0257","authenticated-orcid":false,"given":"Ali Safaa","family":"Sadiq","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Nottingham Trent University, Clifton Lane, Nottingham NG11 8NS, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1443-9458","authenticated-orcid":false,"given":"Seyedali","family":"Mirjalili","sequence":"additional","affiliation":[{"name":"Centre of Artificial Intelligence Research and Optimisation, Torrens University Australia, Brisbane, QLD 4006, Australia"},{"name":"University Research and Innovation Center, Obuda University, 1034 Budapest, Hungary"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1057\/s41284-021-00318-x","article-title":"Prevention and mitigation measures against phishing emails: A sequential schema model","volume":"35","author":"Suzuki","year":"2022","journal-title":"Secur. J."},{"key":"ref_2","unstructured":"APWG (2023, April 01). Phishing Activity Trends Report: 3rd Quarter 2020. Available online: https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2020.pdf."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"103378","DOI":"10.1016\/j.cose.2023.103378","article-title":"A comprehensive dual-layer architecture for phishing and spam email detection","volume":"133","author":"Doshi","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"25","DOI":"10.52306\/RGWS2555","article-title":"Cyber-Situational Crime Prevention and the Breadth of Cybercrimes among Higher Education Institutions","volume":"3","author":"Back","year":"2020","journal-title":"Int. J. Cybersecur. Intell. Cybercrime"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.cose.2020.101716","article-title":"A semantic-based classification approach for an enhanced spam detection","volume":"94","author":"Saidani","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_6","unstructured":"Khandelwal, Y., and Bhargava, R. (2021). Artificial Intelligence and Data Mining Approaches in Security Frameworks, Wiley."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"108702","DOI":"10.1016\/j.compeleceng.2023.108702","article-title":"Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques","volume":"108","author":"Amin","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_8","first-page":"121","article-title":"Comparative Study of Dandelion and Firefly Algorithms for Parameter Estimation of a Dynamic System","volume":"102","author":"Bhatnagar","year":"2020","journal-title":"ISA Trans."},{"key":"ref_9","first-page":"28","article-title":"A Novel Method for Detecting Spam Email using KNN Classification with Spearman Correlation as Distance Measure","volume":"136","author":"Sharma","year":"2016","journal-title":"Int. J. Comput. Appl."},{"key":"ref_10","first-page":"102947","article-title":"Efficient defense strategy against spam and phishing email: An evolutionary game model","volume":"61","author":"Wang","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_11","first-page":"167","article-title":"A study on spam email detection techniques","volume":"6","author":"Kaur","year":"2017","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"ref_12","first-page":"31","article-title":"Content-based spam email detection using statistical feature extraction techniques","volume":"8","author":"Chandrasekhar","year":"2016","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"ref_13","unstructured":"Almeida, T.A., Hidalgo, J.M.G., and Yamakami, A. (2011). DocEng 2011\u2014Proceedings of the 2011 ACM Symposium on Document Engineering, Association for Computing Machinery."},{"key":"ref_14","first-page":"83","article-title":"A deep learning approach for spam email detection","volume":"121","author":"Li","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","first-page":"1967","article-title":"A new hybrid optimization algorithm for spam email detection","volume":"10","author":"Azzouzi","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_16","first-page":"1389","article-title":"Improved cuckoo search algorithm for email spam detection","volume":"11","author":"Mishra","year":"2020","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_17","first-page":"1821","article-title":"A novel hybrid spam detection technique based on optimization algorithms","volume":"12","author":"Saha","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"107655","DOI":"10.1016\/j.compeleceng.2021.107655","article-title":"A novel approach for spam detection based on association rule mining and genetic algorithm","volume":"97","author":"Sokhangoee","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.procs.2022.03.087","article-title":"Detecting Spam Email with Machine Learning Optimized with Harris Hawks optimizer (HHO) Algorithm","volume":"201","author":"Mashaleh","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"13091","DOI":"10.1007\/s00521-022-07148-x","article-title":"A novel approach for spam detection using horse herd optimization algorithm","volume":"34","author":"Hosseinalipour","year":"2022","journal-title":"Neural Comput. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1142\/S0219622020500546","article-title":"Feature Selection with Binary Symbiotic Organisms Search Algorithm for Email Spam Detection","volume":"20","author":"Mohammadzadeh","year":"2021","journal-title":"Int. J. Inf. Technol. Decis. Mak."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s40096-020-00327-8","article-title":"Spam detection through feature selection using artificial neural network and sine\u2013cosine algorithm","volume":"14","author":"Pashiri","year":"2020","journal-title":"Math. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"143721","DOI":"10.1109\/ACCESS.2019.2944089","article-title":"Hybrid Water Cycle Optimization Algorithm with Simulated Annealing for Spam E-mail Detection","volume":"7","author":"Mamat","year":"2019","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","article-title":"Grey Wolf Optimizer","volume":"69","author":"Mirjalili","year":"2014","journal-title":"Adv. Eng. Softw."},{"key":"ref_25","first-page":"30799","article-title":"Improved dandelion algorithm for global optimization problems","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"97974","DOI":"10.1109\/ACCESS.2019.2927846","article-title":"Dandelion algorithm with probability-based mutation","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","first-page":"105712","article-title":"A comparative study of the Dandelion algorithm with recent swarm intelligence algorithms","volume":"84","author":"Javed","year":"2019","journal-title":"Appl. Soft Comput."},{"key":"ref_28","first-page":"122824","article-title":"A novel hybrid Dandelion algorithm with biogeography-based optimization for solving the economic emission load dispatch problem","volume":"273","author":"Namin","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref_29","first-page":"10903","article-title":"Hybrid dandelion algorithm for global optimization problems","volume":"24","author":"Xu","year":"2020","journal-title":"Soft Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/4235.585893","article-title":"No free lunch theorems for optimization","volume":"1","author":"Wolpert","year":"1997","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"105075","DOI":"10.1016\/j.engappai.2022.105075","article-title":"Dandelion Optimizer: A nature-inspired metaheuristic algorithm for engineering applications","volume":"114","author":"Zhao","year":"2022","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1103\/PhysRev.36.823","article-title":"On the theory of the Brownian motion","volume":"36","author":"Uhlenbeck","year":"1930","journal-title":"Phys. Rev."},{"key":"ref_33","unstructured":"Hopkins, M., Reeber, E., Forman, G., and Suermondt, J. (2023, February 28). UCI Machine Learning Repository. Available online: https:\/\/archive.ics.uci.edu\/ml\/datasets\/spambase."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"113338","DOI":"10.1016\/j.eswa.2020.113338","article-title":"Chimp optimization algorithm","volume":"149","author":"Khishe","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"113185","DOI":"10.1016\/j.eswa.2020.113185","article-title":"An efficient binary social spider algorithm for feature selection problem","volume":"146","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_36","first-page":"335","article-title":"Improved salp swarm algorithm for feature selection","volume":"32","author":"Hegazy","year":"2020","journal-title":"J. King Saud Univ.\u2014Comput. Inf. Sci."},{"key":"ref_37","unstructured":"Thaher, T., Heidari, A.A., Mafarja, M., Dong, J.S., and Mirjalili, S. (2020). Evolutionary Machine Learning Techniques: Algorithms and Applications, Springer."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.eswa.2018.08.051","article-title":"Binary butterfly optimization approaches for feature selection","volume":"116","author":"Arora","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"3801","DOI":"10.1007\/s13369-018-3680-6","article-title":"Feature Selection Using Chaotic Salp Swarm Algorithm for Data Classification","volume":"44","author":"Hegazy","year":"2019","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.advengsoft.2017.01.004","article-title":"Grasshopper Optimisation Algorithm: Theory and application","volume":"105","author":"Saremi","year":"2017","journal-title":"Adv. Eng. Softw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.advengsoft.2015.01.010","article-title":"The ant lion optimizer","volume":"83","author":"Mirjalili","year":"2015","journal-title":"Adv. Eng. Softw."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1007\/s00521-015-1920-1","article-title":"Dragonfly algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems","volume":"27","author":"Mirjalili","year":"2016","journal-title":"Neural Comput. Appl."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/10\/196\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:01:28Z","timestamp":1760130088000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/10\/196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,28]]},"references-count":42,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["computers12100196"],"URL":"https:\/\/doi.org\/10.3390\/computers12100196","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,28]]}}}