[1]PU C, WEBB S. Observed trends in spam construction techniques: a case study of spam evolution [C]// CEAS 2006: Proceedings of the Third Conference on Email and Anti-Spam. Mountain View, California: CEAS, 2006: 104-112.
[2]PUNIKIS D, LAURUTIS R, DIRMEIKIS R. An artificial neural nets for spam E-mail recognition [J]. Electronics and Electrical Engineering, 2006, 69(5): 73-76.
[3]ANDROUTSOPOULOS I, PALIOURAS G, MICHELAKIS E. Learning to filter unsolicited commercial E-mail [M]. Athens, Greece: "DEMOKRITOS", National Center for Scientific Research, 2004.
[4]METSIS V, ANDROUTSOPIULOS I, PALIOURAS G. Spam filtering with naive Bayes — which naive Bayes? [C]// CEAS 2006: Proceedings of the Third Conference on Email and Anti-Spam. Mountain View, California: CEAS, 2006: 27-28.
[5]ZHANG L, ZHU J, YAO T. An evaluation of statistical spam filtering techniques [J]. ACM Transactions on Asian Language Information Processing, 2004, 3(4): 243-269.
[6]HOVOLD J. Naive Bayes spam filtering using word-position-based attributes [C]// CEAS 2005: Proceedings of the Second Conference on Email and Anti-Spam. Palo Alto, CA: CEAS, 2005: 41-48.
[7]FUMERA G, PILLAI I, ROLI F. Spam filtering based on the analysis of text information embedded into images [J]. The Journal of Machine Learning Research, 2006, 7: 2699-2720.
[8]ALMEIDA T A, ALMEIDA J, YAMAKAMI A. Spam filtering: how the dimensionality reduction affects the accuracy of Naive Bayes classifiers [J]. Journal of Internet Services and Applications, 2011, 1(3): 183-200.
[9]ALMEIDA T A, YAMAKAMI A, ALMEIDA J. Evaluation of approaches for dimensionality reduction applied with Naive Bayes anti-spam filters [C]// ICMLA'09: Proceedings of the 2009 International Conference on Machine Learning and Applications. Piscataway: IEEE, 2009: 517-522.
[10]SUN Z, XUE L, XU M, et al.Overview of deep learning[J]. Application Research of Computers, 2012, 29(8): 2806-2810. (孙志军,薛磊,许明阳,等.深度学习研究综述[J]. 计算机应用研究, 2012, 29(8): 2806-2810.
[11]HINTON G E, OSINDERO S, TEH Y-W. A fast learning algorithm for deep belief nets [J]. Neural Computation, 2006, 18(7): 1527-1554.
[12]BENGIO Y, LAMBLIN P, POPOVICI D, et al.Greedy layer-wise training of deep networks [C]// NIPS'06: Proceedings of the 2007 Twentieth Annual Conference on Neural Information Processing Systems. Cambridge: MIT Press, 2007, 19: 153-160.
[13]BEUGES C J C. A tutorial on support vector machines for pattern recognition [J]. Data Mining and Knowledge Discovery, 1998, 2(2): 121-167.
[14]NOULAS A K, KRSE B J A. Deep belief networks for dimensionality reduction[EB/OL]. [2013-05-05]. http://dare.uva.nl/document/130040.
[15]ANGUITA D, GHIO A, RIDELLA S, et al.K-fold cross validation for error rate estimate in support vector machines [C]// DMIN 2009: Proceedings of the 2009 International Conference on Data Mining. Las Vegas: CSREA Press, 2009: 291-297. |