WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Journal of Intelligent Information Systems
  2. Journal of Intelligent Information Systems : Volume 42
  3. Journal of Intelligent Information Systems : Volume 42, Issue 1, February 2014
  4. Cost-sensitive three-way email spam filtering
Loading...

Please wait, while we are loading the content...

Journal of Intelligent Information Systems : Volume 48
Journal of Intelligent Information Systems : Volume 47
Journal of Intelligent Information Systems : Volume 46
Journal of Intelligent Information Systems : Volume 45
Journal of Intelligent Information Systems : Volume 44
Journal of Intelligent Information Systems : Volume 43
Journal of Intelligent Information Systems : Volume 42
Journal of Intelligent Information Systems : Volume 42, Issue 3, June 2014
Journal of Intelligent Information Systems : Volume 42, Issue 2, April 2014
Journal of Intelligent Information Systems : Volume 42, Issue 1, February 2014
Clustering-based diversity improvement in top-N recommendation
Cost-sensitive three-way email spam filtering
Bayesian analysis of GUHA hypotheses
Hierarchical directory mapping for category-constrained meta-search
Content based image retrieval via a transductive model
Mining top-k frequent patterns over data streams sliding window
Human perspective to anomaly detection for cybersecurity
Dealing with trajectory streams by clustering and mathematical transforms
Journal of Intelligent Information Systems : Volume 41
Journal of Intelligent Information Systems : Volume 40
Journal of Intelligent Information Systems : Volume 39
Journal of Intelligent Information Systems : Volume 38
Journal of Intelligent Information Systems : Volume 37
Journal of Intelligent Information Systems : Volume 36
Journal of Intelligent Information Systems : Volume 35
Journal of Intelligent Information Systems : Volume 34
Journal of Intelligent Information Systems : Volume 33
Journal of Intelligent Information Systems : Volume 32
Journal of Intelligent Information Systems : Volume 31
Journal of Intelligent Information Systems : Volume 30
Journal of Intelligent Information Systems : Volume 29
Journal of Intelligent Information Systems : Volume 28
Journal of Intelligent Information Systems : Volume 27
Journal of Intelligent Information Systems : Volume 26
Journal of Intelligent Information Systems : Volume 25
Journal of Intelligent Information Systems : Volume 24
Journal of Intelligent Information Systems : Volume 23
Journal of Intelligent Information Systems : Volume 22
Journal of Intelligent Information Systems : Volume 21
Journal of Intelligent Information Systems : Volume 20
Journal of Intelligent Information Systems : Volume 19
Journal of Intelligent Information Systems : Volume 18
Journal of Intelligent Information Systems : Volume 17
Journal of Intelligent Information Systems : Volume 16
Journal of Intelligent Information Systems : Volume 15
Journal of Intelligent Information Systems : Volume 14
Journal of Intelligent Information Systems : Volume 13
Journal of Intelligent Information Systems : Volume 12
Journal of Intelligent Information Systems : Volume 11
Journal of Intelligent Information Systems : Volume 10
Journal of Intelligent Information Systems : Volume 9
Journal of Intelligent Information Systems : Volume 8

Similar Documents

...
UniDis: a universal discretization technique

Article

...
Learning Instance Weighted Naive Bayes from labeled and unlabeled data

Article

...
A naive Bayes probability estimation model based on self-adaptive differential evolution

Article

...
Link-based web spam detection using weight properties

Article

...
Mining complex patterns

Article

...
DoSO: a document self-organizer

Article

...
Evaluation in Music Information Retrieval

Article

...
Clustering-based diversity improvement in top-N recommendation

Article

...
Special issue on SIASP at ICDM 2010

Article

Cost-sensitive three-way email spam filtering

Content Provider Springer Nature Link
Author Zhou, Bing Yao, Yiyu Luo, Jigang
Copyright Year 2013
Abstract Email spam filtering is typically treated as a binary classification problem that can be solved by machine learning algorithms. We argue that a three-way decision approach provides a more meaningful way to users for precautionary handling their incoming emails. Three email folders instead of two are produced in a three-way spam filtering system, a suspected folder is added to allow users make further examinations of suspicious emails, thereby reducing the chances of misclassification. Different from existing ternary email spam filtering systems, we focus on two issues that are less studied, that is, the computation of required thresholds to define the three email categories, and the interpretation of the cost-sensitive characteristics of spam filtering. Instead of supplying the thresholds based on intuitive understandings of the levels of tolerance for errors, we systematically calculate the thresholds based on decision-theoretic rough set model. A loss function is interpreted as the costs of making classification decisions. A decision is made for which the overall cost is minimum. Experimental results show that the new approach reduces the error rate of misclassifying a legitimate email to spam and demonstrates a better performance for the cost-sensitivity aspect.
Starting Page 19
Ending Page 45
Page Count 27
File Format PDF
ISSN 09259902
Journal Journal of Intelligent Information Systems
Volume Number 42
Issue Number 1
e-ISSN 15737675
Language English
Publisher Springer US
Publisher Date 2013-06-09
Publisher Place Boston
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword Email spam filtering Cost-sensitive learning Ternary classification Three-way decision Naive Bayes classifier Information Storage and Retrieval Data Structures, Cryptology and Information Theory Artificial Intelligence (incl. Robotics) Business Information Systems Document Preparation and Text Processing
Content Type Text
Resource Type Article
Subject Artificial Intelligence Computer Networks and Communications Information Systems Software Hardware and Architecture
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...