Universal spam detection using transfer learning of BERT model

VS Tida, S Hsu - arXiv preprint arXiv:2202.03480, 2022 - arxiv.org
Deep learning transformer models become important by training on text data based on self-
attention mechanisms. This manuscript demonstrated a novel universal spam detection …

A spam email detection mechanism for English language text emails using deep learning approach

S Kaddoura, O Alfandi… - 2020 IEEE 29th …, 2020 - ieeexplore.ieee.org
Phishing emails are emails that pretend to be from a trusted company that target users to
provide personal or financial information. Sometimes, they include links that may download …

Preserving user's privacy in web search engines

J Castellà-Roca, A Viejo… - Computer …, 2009 - Elsevier
Web search engines (eg Google, Yahoo, Microsoft Live Search, etc.) are widely used to find
certain data among a huge amount of information in a minimal amount of time. However …

A MapReduce based parallel SVM for large scale spam filtering

G Caruana, M Li, M Qi - 2011 eighth international conference …, 2011 - ieeexplore.ieee.org
Spam continues to inflict increased damage. Varying approaches including Support Vector
Machine (SVM) based techniques have been proposed for spam classification. However …

[PDF][PDF] Overview of textual anti-spam filtering techniques

T Subramaniam, HA Jalab, AY Taqa - Int. J. Phys. Sci, 2010 - academia.edu
Elecronic mail (E-mail) is an essential communication tool that has been greatly abused by
spammers to disseminate unwanted information (messages) and spread malicious contents …

[PDF][PDF] Machine Learning based Spam E-Mail Detection.

P Sharma, U Bhardwaj - International Journal of Intelligent Engineering & …, 2018 - inass.org
Spam email is one of the biggest issues in the world of internet. Spam emails not only
influence the organisations financially but also exasperate the individual email user. This …

An ontology enhanced parallel SVM for scalable spam filter training

G Caruana, M Li, Y Liu - Neurocomputing, 2013 - Elsevier
Spam, under a variety of shapes and forms, continues to inflict increased damage. Varying
approaches including Support Vector Machine (SVM) techniques have been proposed for …

[HTML][HTML] Detection of fraudulent emails by employing advanced feature abundance

S Nizamani, N Memon, M Glasdam… - Egyptian Informatics …, 2014 - Elsevier
In this paper, we present a fraudulent email detection model using advanced feature choice.
We extracted various kinds of features and compared the performance of each category of …

Web 3.0: governance, risks and safeguards

R Bruwer, H Jacobus, R Rudman - 2015 - scholar.sun.ac.za
Many organisations consider technology as a significant asset to generate income and
control cost. The Web is recognised as the fastest growing publication medium of all time …

Using social networks to distort users' profiles generated by web search engines

A Viejo, J Castellà-Roca - Computer Networks, 2010 - Elsevier
The Internet is one of the most important sources of knowledge in the present time. It offers a
huge volume of information which grows dramatically every day. Web search engines (eg …