首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 375 毫秒
1.
李爽 《科技通报》2012,28(4):180-181
针对传统的朴素贝叶斯算法对垃圾邮件的过滤率不高等问题,提出了一种基于最小风险贝叶斯网络垃圾邮件信息过滤技术,提出的最小风险贝叶斯能够减少正常邮件判为垃圾邮件的风险,最后实验表明,与传统的算法相比较,本文提出的方法过滤效果有较大的提高。  相似文献   

2.
垃圾邮件问题日益严重,受到研究人员的广泛关注。基于内容的过滤是当前解决垃圾邮件问题的主流技术之一。目前基于内容的垃圾邮件过滤主要包括基于规则的方法和基于概率统计的方法。本文综述了目前用于垃圾邮件过滤研究的各种语料和评价方法,并总结了目前使用的垃圾邮件过滤技术,包括决策树、RoughSet、Bayes、kNN、SVM、Winnow等等。实验结果表明:FlexibleBayes、SVM、Winnow方法是目前较好的垃圾邮件过滤方法,它们在评测语料上的结果已经达到很高水平,但是,要走向真正实用化,还有很多的工作要做。  相似文献   

3.
介绍了垃圾邮件的现状,以及目前常见的反垃圾邮件的方法。针对贝叶斯算法的特点,介绍使用贝叶斯过滤的方法实现垃圾邮件的过滤技术。  相似文献   

4.
垃圾邮件现在已经成了一个非常严重问题摆在我们的面前。在对抗垃圾邮件的技术中还有一种极为重要的是邮件过滤技术(Mail Filter)。通过实时黑名单技术和邮件过滤技术相配合能更有效地消除垃圾邮件带来的影响。  相似文献   

5.
从探究垃圾邮件现象出现的本质出发,剖析现有的反垃圾邮件技术,重点研究了多Agent技术在反垃圾邮件中的应用。通过对现有技术条件和应用环境的分析,多技术的融合、交叉与协作处理垃圾邮件是最有效的方法,应用也最广泛。然而,多种技术模块化的结合面对越来越高明的垃圾邮件发布者已经突显出它的弱点,多Agent技术为垃圾邮件过滤系统的设计提供了新的思路。在现有技术的基础上,研究了多Agent智能垃圾邮件过滤系统,主要研究内容为:利用多Agent系统的自学习和协同工作的特性,使得多种垃圾邮件过滤技术既能独立运行,也能协同工作,并通过反馈学习,不断更新对垃圾邮件特征的认识,从而提高垃圾邮件过滤系统的性能和准确率,构造出了基于多Agent智能垃圾邮件处理系统模型,提出了明确的反垃圾邮件技术应用建议。  相似文献   

6.
互联网的发展逐渐改变了人们的生活方式,电子邮件因其方便、快捷的特点已受到人们的青睐。但许多垃圾邮件同时也在网络中蔓延,占据了邮件服务器的大量存储空间,用户往往需要花费大量的时间去删除这些垃圾邮件。因此,研究邮件的自动过滤具有重要意义。邮件的自动过滤主要有基于规则和基于统计两种方式。而目前基于统计的过滤器中,常用的贝叶斯方法等是建立在经验风险最小化的基础之上,过滤器推广性能较差。支持向量机(SVM)是在统计学习理论的基础上发展而来的一种新的模式识别方法,在解决有限样本、非线性及高维模式识别问题中表现出许多特有的优势。它不仅考虑了对推广能力的要求,而且追求在有限信息的条件下得到最优结果。因此,本文将支持向量机应用于邮件过滤,实验证明过滤效果较好。  相似文献   

7.
基于机器学习的垃圾邮件过滤技术   总被引:1,自引:0,他引:1  
垃圾邮件给人们的生活带来了极大的危害,为了制止垃圾邮件的进一步扩散,研究者们提出大量的检测算法.本文首先分析了垃圾邮件过滤的一般步骤,再对机器学习算法在垃圾邮件过滤技术中的应用进行了全面分析,最后对邮件过滤技术研究方向进行展望.  相似文献   

8.
基于内容的垃圾邮件过滤技术综述   总被引:1,自引:0,他引:1  
针对垃圾邮件泛滥成灾的现状,综述了以邮件内容为主要过滤对象的垃圾邮件过滤的相关技术,通过各种技术的实验比较,总结了各自的过滤效果,从而为今后开发高水平的垃圾邮件过滤系统提供了一个基础平台。  相似文献   

9.
赵凯 《科技通报》2012,28(6):85-86
电子邮件是人们交流的主要方式之一,但垃圾邮件的泛滥给使用者带来了很大的困扰。鉴于传统过滤技术的缺点,本文采用性能更优的Fuzzy-ID3方法对邮件进行分析,通过提取邮件的特征信息、数据预处理等步骤,得到一棵修剪后的模糊决策树,并转换为的邮件分类规则,使用这些规则可以提高邮件分类的准确性及效率。  相似文献   

10.
如何快速有效地防止垃圾邮件,使之有效地在个人和集体中发挥作用,是需要解决的问题.本文首先对垃圾邮件的危害作了简要论述,然后提出了一些个人防止垃圾邮件的方法,在反垃圾邮件一些旧技术基础上,提出了一些反垃圾邮件的最新技术.  相似文献   

11.
The problem of social spam detection has been traditionally modeled as a supervised classification problem. Despite the initial success of this detection approach, later analysis of proposed systems and detection features has shown that, like email spam, the dynamic and adversarial nature of social spam makes the performance achieved by supervised systems hard to maintain. In this paper, we investigate the possibility of using the output of previously proposed supervised classification systems as a tool for spammers discovery. The hypothesis is that these systems are still highly capable of detecting spammers reliably even when their recall is far from perfect. We then propose to use the output of these classifiers as prior beliefs in a probabilistic graphical model framework. This framework allows beliefs to be propagated to similar social accounts. Basing similarity on a who-connects-to-whom network has been empirically critiqued in recent literature and we propose here an alternative definition based on a bipartite users-content interaction graph. For evaluation, we build a Markov Random Field on a graph of similar users and compute prior beliefs using a selection of state-of-the-art classifiers. We apply Loopy Belief Propagation to obtain posterior predictions on users. The proposed system is evaluated on a recent Twitter dataset that we collected and manually labeled. Classification results show a significant increase in recall and a maintained precision. This validates that formulating the detection problem with an undirected graphical model framework permits to restore the deteriorated performances of previously proposed statistical classifiers and to effectively mitigate the effect of spam evolution.  相似文献   

12.
Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance??the privacy equation by which they form judgments??across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform.  相似文献   

13.
Because of the increasing significance of social communication technologies within an organization, they have become a new form of information processing, resulting in business process transitions and increased benefits. By applying media richness theory and social theories, this study investigated how social communication technologies (SCTs) can be used by an employee to fit his/her task characteristics. Additionally, it also examined how the employee's social relationships moderated media usage in the current job environment and how this usage influenced the task performance. Five media were selected in this study (telephone, video conferencing, email, instant messaging, and blog). Using a hierarchical regression approach, we found that task characteristics were related to media usage, whereas social factors (social influence and social affinity) moderated the degree of the relationships. A few particular media and technologies seemed to perform well, however these are influenced by the social aspects. Moreover, the usage of social technologies results in positive task performance. The performance of a few specific technologies demonstrated binding effects (email performance was associated with instant messenger performance). In summary, we found that the usage of SCTs is instrumentally determined by the interaction between the task and social relationships.  相似文献   

14.
This study addresses the usage of different features to complement synset-based and bag-of-words representations of texts in the context of using classical ML approaches for spam filtering (Ferrara, 2019). Despite the existence of a large number of complementary features, in order to improve the applicability of this study, we have selected only those that can be computed regardless of the communication channel used to distribute content. Feature evaluation has been performed using content distributed through different channels (social networks and email) and classifiers (Adaboost, Flexible Bayes, Naïve Bayes, Random Forests, and SVMs). The results have revealed the usefulness of detecting some non-textual entities (such as URLs, Uniform Resource Locators) in the addressed distribution channels. Moreover, we also found that compression properties and/or information regarding the probability of correctly guessing the language of target texts could be successfully used to improve the classification in a wide range of situations. Finally, we have also detected features that are influenced by specific fashions and habits of users of certain Internet services (e.g. the existence of words written in capital letters) that are not useful for spam filtering.  相似文献   

15.
After reviewing some of the difficulties caused by spam and summarizing the arguments of its defenders, this paper will focus on its present legal status. It will then dwell on spam from a moral point of view and address some of the ethical implications associated with transmitting this unsolicited commercial e-mail. It will attempt to sort out the conflicting rights involved and develop a viable case that even if we prescind from its social costs, spam is ethically questionable under certain conditions. Moreover, given the current volume of spam and its negative impact on the Internet environment, the transmission of spam can also be characterized as an asocial act primarily because of the significant externalities which it generates. As a result, spam cannot be justified from the perspective of duty-based moral philosophies that emphasize the need to conform to the legitimate norms of the community.  相似文献   

16.
Blogging has been an emerging media for people to express themselves. However, the presence of spam blogs (also known as splogs) may reduce the value of blogs and blog search engines. Hence, splog detection has recently attracted much attention from research. Most existing works on splog detection identify splogs using their content/link features and target on spam filters protecting blog search engines’ index from spam. In this paper, we propose a splog detection framework by monitoring the on-line search results. The novelty of our splog detection is that our detection capitalizes on the results returned by search engines. The proposed method therefore is particularly useful in detecting those splogs that have successfully slipped through the spam filters that are also actively generating spam-posts. More specifically, our method monitors the top-ranked results of a sequence of temporally-ordered queries and detects splogs based on blogs’ temporal behavior. The temporal behavior of a blog is maintained in a blog profile. Given blog profiles, splog detecting functions have been proposed and evaluated using real data collected from a popular blog search engine. Our experiments have demonstrated that splogs could be detected with high accuracy. The proposed method can be implemented on top of any existing blog search engine without intrusion to the latter.  相似文献   

17.
The management of email remains a major challenge for organisations. In this article, we explore the extent of the perceptions of email as a business critical tool within an organisation and how the level of such perceptions may moderate the level of email overload experienced by individuals within the organisation. Data from a sample of 1100 employees of a multinational technology firm are analysed using multivariate techniques. The results suggest that without a clearly stated code of email practice within an organisation, there are likely to be large variations in what is perceived as ‘business-critical’ email and, as a result, a substantial amount of email generated within the organisation may not be ‘business-critical’, potentially increasing the level of ‘email-overload’ experienced by individuals within the organisation.  相似文献   

18.
通过邮件精准推送实现学术论文高效传播   总被引:2,自引:2,他引:0  
[目的]为科技期刊编辑提供学术论文邮件精准推送的经验,实现论文高效传播,提升科技期刊影响力。[方法]基于Science China-Physics, Mechanics & Astronomy(SCPMA)期刊文章邮件精准推送实践,介绍了邮件精准推送的优势、查找文章相关领域小同行的方法以及充分挖掘有效推送群体的相关经验,并提出一些切实的建议。[结果]具体实例和统计数据表明论文邮件精准推送对SCPMA文章被引频次提升有明显促进作用。[结论]邮件精准推送是高效传播学术论文、提升科技期刊影响力的重要方法,应该成为学术期刊编辑重要的工作内容之一。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号