共查询到19条相似文献,搜索用时 125 毫秒
1.
针对传统的朴素贝叶斯算法对垃圾邮件的过滤率不高等问题,提出了一种基于最小风险贝叶斯网络垃圾邮件信息过滤技术,提出的最小风险贝叶斯能够减少正常邮件判为垃圾邮件的风险,最后实验表明,与传统的算法相比较,本文提出的方法过滤效果有较大的提高。 相似文献
2.
随着藏文编码字符集国际标准的制定,以及微软的第一个全面支持藏文的Windows Vista操作系统的发布,计算机对藏文的处理能力达到了与英文和汉文相同的级别.藏文垃圾邮件正处在萌发中,将对国家安全和社会稳定带来了威胁.贝叶斯算法广泛用于中、英文垃圾邮件过滤中,但藏文有其独特的语言特性,不能把国内外的研究成果直接应用到藏文垃圾邮件的过滤中.本文介绍了朴素贝叶斯算法的基本原理和藏文垃圾邮件的特殊性,最后分析了基于贝叶斯的藏文垃圾邮件过滤器的性能的几个因素. 相似文献
3.
基于贝叶斯方法在垃圾邮件处理上具有速度快、准确率高的优点,基于贝叶斯分类的垃圾邮件分类方法受到广泛的关注.我们主要研究制约中文邮件过滤效果的中文分词方法,比较基于统计的多种方法,并根据需要对其中几种算法进行改进. 相似文献
4.
对基于贝叶斯的垃圾邮件过滤器的原理及其关键技术进行了详细描述。针对朴素贝叶斯模型对分类信息过度简化和准确率低等缺点,通过引入拉普拉斯平滑对贝叶斯过滤器进行了设计与实现。实验结果表明,改进后的贝叶斯过滤器具有了更好的过滤效果。 相似文献
5.
6.
简单阐述了垃圾邮件的定义、现状和危害,对目前垃圾邮件的主要几种过滤技术进行了全面介绍和分析,并指出了垃圾邮件过滤技术的发展趋势。 相似文献
7.
垃圾邮件问题日益严重,受到研究人员的广泛关注。基于内容的过滤是当前解决垃圾邮件问题的主流技术之一。目前基于内容的垃圾邮件过滤主要包括基于规则的方法和基于概率统计的方法。本文综述了目前用于垃圾邮件过滤研究的各种语料和评价方法,并总结了目前使用的垃圾邮件过滤技术,包括决策树、RoughSet、Bayes、kNN、SVM、Winnow等等。实验结果表明:FlexibleBayes、SVM、Winnow方法是目前较好的垃圾邮件过滤方法,它们在评测语料上的结果已经达到很高水平,但是,要走向真正实用化,还有很多的工作要做。 相似文献
8.
基于单客户端的垃圾邮件过滤系统面对技术越来越高明的垃圾邮件发布者已经突现出它的弱点,多Agent技术为垃圾邮件过滤系统的设计提供了新的思路。旨在将Multi-agent技术和协同过滤的思想引入到垃圾邮件过滤系统中,设计一个多层次垃圾邮件过滤系统。该系统针对垃圾邮件一般群发给多人的特点,提取用户的操作和阅读速度进行反馈,利用他人的反馈结果进行协同过滤。 相似文献
9.
在朴素贝叶斯算法的基础上,采用多变量贝努里事件模型对该算法进行改进,并基于改进的算法建立了一个垃圾邮件过滤系统。分别在Spam Assassin、CCERT2005-Jul语料集上用cost-sensitive评价法对该系统进行评价,考虑到特征数量选取对结果的影响,先实验选取最佳性能时的特征数量。可以看到,该过滤系统可以达到很好的过滤效果。 相似文献
10.
在朴素贝叶斯算法的基础上,采用多变量贝努里事件模型对该算法进行改进,并基于改进的算法建立了一个垃圾邮件过滤系统.分别在Spam Assassin、CCERT 2005-Jul语料集上用cost-sensitive评价法对该系统进行评价,考虑到特征数量选取对结果的影响,先实验选取最佳性能时的特征数量.可以看到,该过滤系统可以达到很好的过滤效果. 相似文献
11.
本文在介绍和分析贝叶斯理论的基础上,提出了贝叶斯算法和朴素贝叶斯分类器.并阐述了贝叶斯算法及朴素贝叶斯分类器在反垃圾邮件中的应用. 相似文献
12.
电子邮件已渐渐在网络通信中扮演极其重要的角色,成为构建Internet的基石之一。本文在对垃圾邮件做了简单介绍的基础上,分析了垃圾邮件在我国肆意泛滥的严重危害,并论述了现今被广泛使用的几种主流反垃圾邮件过滤技术。 相似文献
13.
定义垃圾评论边界,利用智能算法有效识别垃圾评论。对垃圾评论进行内部细分,构建评价指标体系,并提出一种改良决策树方法对垃圾评论进行智能评估,并提供可读性规则。基于Matlab语言实现,通过实证研究,验证所构建的垃圾评论识别模型能够达到较高预测精度。提供了一种高效的多在线评论多分类智能识别方法,为垃圾评论的分类监管治理提供技术支持。 相似文献
14.
R.A. Spinello 《Ethics and Information Technology》1999,1(3):185-191
After reviewing some of the difficulties caused by spam and summarizing the arguments of its defenders, this paper will focus on its present legal status. It will then dwell on spam from a moral point of view and address some of the ethical implications associated with transmitting this unsolicited commercial e-mail. It will attempt to sort out the conflicting rights involved and develop a viable case that even if we prescind from its social costs, spam is ethically questionable under certain conditions. Moreover, given the current volume of spam and its negative impact on the Internet environment, the transmission of spam can also be characterized as an asocial act primarily because of the significant externalities which it generates. As a result, spam cannot be justified from the perspective of duty-based moral philosophies that emphasize the need to conform to the legitimate norms of the community. 相似文献
15.
《Information processing & management》2016,52(6):1053-1073
Spam in recent years has pervaded all forms of digital communication.The increase in user base for social platforms like Facebook, Twitter, YouTube, etc., has opened new avenues for spammers. The liberty to contribute content freely has encouraged the spammers to exploit the social platforms for their benefits. E-mail and web search engine being the early victims of spam have attracted serious attention from the information scientists for quite some time. A substantial amount of research has been directed to combat spam on these two platforms. Social networks being quite different in nature from the earlier two, have different kinds of spam and spam-fighting techniques from these domains seldom work. Moreover, due to the continuous and rapid evolution of social media, spam themselves evolve very fast posing a great challenge to the community. Despite being relatively new, there has been a number of attempts in the area of social spam in the recent past and a lot many are certain to come in near future. This paper surveys the recent developments in the area of social spam detection and mitigation, its theoretical models and applications along with their qualitative comparison. We present the state-of-the-art and attempt to provide challenges to be addressed, as the nature and content of spam are bound to get more complicated. 相似文献
16.
Emma Rooksby 《Ethics and Information Technology》2007,9(2):141-152
Much attention has been given in recent years to the moral status of commercial spam. Less attention has been focused on newer,
non-commercial varieties of spam, such as spam from political parties, community sector organizations and governments. This
article makes a start on evaluating the moral status of these non-commercial varieties of spam, drawing on arguments used
to evaluate commercial spam. 相似文献
17.
垃圾邮件的泛滥提出了极为迫切的技术诉求,文章介绍了基于文本分类技术的垃圾邮件过滤系统模型,首先介绍了整个系统工作流程,然后阐述了系统中文本分词,文本特征提取,Winnow线性分类器等关键环节。 相似文献
18.
19.
Blogging has been an emerging media for people to express themselves. However, the presence of spam blogs (also known as splogs) may reduce the value of blogs and blog search engines. Hence, splog detection has recently attracted much attention from research. Most existing works on splog detection identify splogs using their content/link features and target on spam filters protecting blog search engines’ index from spam. In this paper, we propose a splog detection framework by monitoring the on-line search results. The novelty of our splog detection is that our detection capitalizes on the results returned by search engines. The proposed method therefore is particularly useful in detecting those splogs that have successfully slipped through the spam filters that are also actively generating spam-posts. More specifically, our method monitors the top-ranked results of a sequence of temporally-ordered queries and detects splogs based on blogs’ temporal behavior. The temporal behavior of a blog is maintained in a blog profile. Given blog profiles, splog detecting functions have been proposed and evaluated using real data collected from a popular blog search engine. Our experiments have demonstrated that splogs could be detected with high accuracy. The proposed method can be implemented on top of any existing blog search engine without intrusion to the latter. 相似文献