首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
李爽 《科技通报》2012,28(4):180-181
针对传统的朴素贝叶斯算法对垃圾邮件的过滤率不高等问题,提出了一种基于最小风险贝叶斯网络垃圾邮件信息过滤技术,提出的最小风险贝叶斯能够减少正常邮件判为垃圾邮件的风险,最后实验表明,与传统的算法相比较,本文提出的方法过滤效果有较大的提高。  相似文献   

2.
随着藏文编码字符集国际标准的制定,以及微软的第一个全面支持藏文的Windows Vista操作系统的发布,计算机对藏文的处理能力达到了与英文和汉文相同的级别.藏文垃圾邮件正处在萌发中,将对国家安全和社会稳定带来了威胁.贝叶斯算法广泛用于中、英文垃圾邮件过滤中,但藏文有其独特的语言特性,不能把国内外的研究成果直接应用到藏文垃圾邮件的过滤中.本文介绍了朴素贝叶斯算法的基本原理和藏文垃圾邮件的特殊性,最后分析了基于贝叶斯的藏文垃圾邮件过滤器的性能的几个因素.  相似文献   

3.
甘宏  潘丹 《科技广场》2009,(11):24-26
基于贝叶斯方法在垃圾邮件处理上具有速度快、准确率高的优点,基于贝叶斯分类的垃圾邮件分类方法受到广泛的关注.我们主要研究制约中文邮件过滤效果的中文分词方法,比较基于统计的多种方法,并根据需要对其中几种算法进行改进.  相似文献   

4.
对基于贝叶斯的垃圾邮件过滤器的原理及其关键技术进行了详细描述。针对朴素贝叶斯模型对分类信息过度简化和准确率低等缺点,通过引入拉普拉斯平滑对贝叶斯过滤器进行了设计与实现。实验结果表明,改进后的贝叶斯过滤器具有了更好的过滤效果。  相似文献   

5.
在信息技术飞速发展的今天,电子邮件作为一种快捷,经济的通信方式得到了普及,但随之而来垃圾邮件问题也愈加严重。邮件中包含的广告、不良信息甚至是病毒,会对用户造成更大的危害。本文通过对当前反垃圾邮件技术的研究,选取关键字过滤、黑白名单过滤与贝叶斯过滤三种过滤法来实现一个反垃圾邮件管理系统,旨在帮助用户过滤垃圾邮件,获取更好的邮件使用体验。  相似文献   

6.
龚薇 《科技广场》2005,(5):99-101
简单阐述了垃圾邮件的定义、现状和危害,对目前垃圾邮件的主要几种过滤技术进行了全面介绍和分析,并指出了垃圾邮件过滤技术的发展趋势。  相似文献   

7.
垃圾邮件问题日益严重,受到研究人员的广泛关注。基于内容的过滤是当前解决垃圾邮件问题的主流技术之一。目前基于内容的垃圾邮件过滤主要包括基于规则的方法和基于概率统计的方法。本文综述了目前用于垃圾邮件过滤研究的各种语料和评价方法,并总结了目前使用的垃圾邮件过滤技术,包括决策树、RoughSet、Bayes、kNN、SVM、Winnow等等。实验结果表明:FlexibleBayes、SVM、Winnow方法是目前较好的垃圾邮件过滤方法,它们在评测语料上的结果已经达到很高水平,但是,要走向真正实用化,还有很多的工作要做。  相似文献   

8.
基于单客户端的垃圾邮件过滤系统面对技术越来越高明的垃圾邮件发布者已经突现出它的弱点,多Agent技术为垃圾邮件过滤系统的设计提供了新的思路。旨在将Multi-agent技术和协同过滤的思想引入到垃圾邮件过滤系统中,设计一个多层次垃圾邮件过滤系统。该系统针对垃圾邮件一般群发给多人的特点,提取用户的操作和阅读速度进行反馈,利用他人的反馈结果进行协同过滤。  相似文献   

9.
罗琴 《黑龙江科技信息》2009,(28):101-101,156
在朴素贝叶斯算法的基础上,采用多变量贝努里事件模型对该算法进行改进,并基于改进的算法建立了一个垃圾邮件过滤系统。分别在Spam Assassin、CCERT2005-Jul语料集上用cost-sensitive评价法对该系统进行评价,考虑到特征数量选取对结果的影响,先实验选取最佳性能时的特征数量。可以看到,该过滤系统可以达到很好的过滤效果。  相似文献   

10.
在朴素贝叶斯算法的基础上,采用多变量贝努里事件模型对该算法进行改进,并基于改进的算法建立了一个垃圾邮件过滤系统.分别在Spam Assassin、CCERT 2005-Jul语料集上用cost-sensitive评价法对该系统进行评价,考虑到特征数量选取对结果的影响,先实验选取最佳性能时的特征数量.可以看到,该过滤系统可以达到很好的过滤效果.  相似文献   

11.
本文在介绍和分析贝叶斯理论的基础上,提出了贝叶斯算法和朴素贝叶斯分类器.并阐述了贝叶斯算法及朴素贝叶斯分类器在反垃圾邮件中的应用.  相似文献   

12.
电子邮件已渐渐在网络通信中扮演极其重要的角色,成为构建Internet的基石之一。本文在对垃圾邮件做了简单介绍的基础上,分析了垃圾邮件在我国肆意泛滥的严重危害,并论述了现今被广泛使用的几种主流反垃圾邮件过滤技术。  相似文献   

13.
赵静娴 《现代情报》2016,36(4):57-61
定义垃圾评论边界,利用智能算法有效识别垃圾评论。对垃圾评论进行内部细分,构建评价指标体系,并提出一种改良决策树方法对垃圾评论进行智能评估,并提供可读性规则。基于Matlab语言实现,通过实证研究,验证所构建的垃圾评论识别模型能够达到较高预测精度。提供了一种高效的多在线评论多分类智能识别方法,为垃圾评论的分类监管治理提供技术支持。  相似文献   

14.
After reviewing some of the difficulties caused by spam and summarizing the arguments of its defenders, this paper will focus on its present legal status. It will then dwell on spam from a moral point of view and address some of the ethical implications associated with transmitting this unsolicited commercial e-mail. It will attempt to sort out the conflicting rights involved and develop a viable case that even if we prescind from its social costs, spam is ethically questionable under certain conditions. Moreover, given the current volume of spam and its negative impact on the Internet environment, the transmission of spam can also be characterized as an asocial act primarily because of the significant externalities which it generates. As a result, spam cannot be justified from the perspective of duty-based moral philosophies that emphasize the need to conform to the legitimate norms of the community.  相似文献   

15.
Spam in recent years has pervaded all forms of digital communication.The increase in user base for social platforms like Facebook, Twitter, YouTube, etc., has opened new avenues for spammers. The liberty to contribute content freely has encouraged the spammers to exploit the social platforms for their benefits. E-mail and web search engine being the early victims of spam have attracted serious attention from the information scientists for quite some time. A substantial amount of research has been directed to combat spam on these two platforms. Social networks being quite different in nature from the earlier two, have different kinds of spam and spam-fighting techniques from these domains seldom work. Moreover, due to the continuous and rapid evolution of social media, spam themselves evolve very fast posing a great challenge to the community. Despite being relatively new, there has been a number of attempts in the area of social spam in the recent past and a lot many are certain to come in near future. This paper surveys the recent developments in the area of social spam detection and mitigation, its theoretical models and applications along with their qualitative comparison. We present the state-of-the-art and attempt to provide challenges to be addressed, as the nature and content of spam are bound to get more complicated.  相似文献   

16.
Much attention has been given in recent years to the moral status of commercial spam. Less attention has been focused on newer, non-commercial varieties of spam, such as spam from political parties, community sector organizations and governments. This article makes a start on evaluating the moral status of these non-commercial varieties of spam, drawing on arguments used to evaluate commercial spam.  相似文献   

17.
垃圾邮件的泛滥提出了极为迫切的技术诉求,文章介绍了基于文本分类技术的垃圾邮件过滤系统模型,首先介绍了整个系统工作流程,然后阐述了系统中文本分词,文本特征提取,Winnow线性分类器等关键环节。  相似文献   

18.
目前对垃圾邮件的过滤主要有基于内容、基于IP地址和基于规则等方法,这些方法对垃圾邮件的过滤起到了一定作用。但单种邮件过滤技术只是针对邮件的某种属性进行过滤,因而造成邮件过滤判断的片面性。对此,设计了基于陪审团机制的邮件过滤系统。在这个系统中,各种现有的邮件过滤器对邮件的过滤结果,并非邮件过滤的最后结果,而是作为该系统的邮件过滤判断的一个输入值,最后根据系统所定的计算规则得出邮件的最终过滤结果。  相似文献   

19.
Blogging has been an emerging media for people to express themselves. However, the presence of spam blogs (also known as splogs) may reduce the value of blogs and blog search engines. Hence, splog detection has recently attracted much attention from research. Most existing works on splog detection identify splogs using their content/link features and target on spam filters protecting blog search engines’ index from spam. In this paper, we propose a splog detection framework by monitoring the on-line search results. The novelty of our splog detection is that our detection capitalizes on the results returned by search engines. The proposed method therefore is particularly useful in detecting those splogs that have successfully slipped through the spam filters that are also actively generating spam-posts. More specifically, our method monitors the top-ranked results of a sequence of temporally-ordered queries and detects splogs based on blogs’ temporal behavior. The temporal behavior of a blog is maintained in a blog profile. Given blog profiles, splog detecting functions have been proposed and evaluated using real data collected from a popular blog search engine. Our experiments have demonstrated that splogs could be detected with high accuracy. The proposed method can be implemented on top of any existing blog search engine without intrusion to the latter.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号