A review of spam email detection: analysis of spammer strategies and the dataset shift problem

F Jáñez-Martino, R Alaiz-Rodríguez… - Artificial Intelligence …, 2023 - Springer
Spam emails have been traditionally seen as just annoying and unsolicited emails
containing advertisements, but they increasingly include scams, malware or phishing. In …

Adversarial attacks in explainable machine learning: A survey of threats against models and humans

J Vadillo, R Santana, JA Lozano - … Reviews: Data Mining and …, 2025 - Wiley Online Library
Reliable deployment of machine learning models such as neural networks continues to be
challenging due to several limitations. Some of the main shortcomings are the lack of …

Fake news detection using machine learning: an adversarial collaboration approach

KM DSouza, AM French - Internet Research, 2024 - emerald.com
Purpose Purveyors of fake news perpetuate information that can harm society, including
businesses. Social media's reach quickly amplifies distortions of fake news. Research has …

Asymmetric certified robustness via feature-convex neural networks

S Pfrommer, B Anderson, J Piet… - Advances in Neural …, 2024 - proceedings.neurips.cc
Real-world adversarial attacks on machine learning models often feature an asymmetric
structure wherein adversaries only attempt to induce false negatives (eg, classify a spam …

Effective and imperceptible adversarial textual attack via multi-objectivization

S Liu, N Lu, W Hong, C Qian, K Tang - ACM Transactions on …, 2024 - dl.acm.org
The field of adversarial textual attack has significantly grown over the past few years, where
the commonly considered objective is to craft adversarial examples (AEs) that can …

How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks

S Dyrmishi, S Ghamizi, M Cordy - arXiv preprint arXiv:2305.15587, 2023 - arxiv.org
Natural Language Processing (NLP) models based on Machine Learning (ML) are
susceptible to adversarial attacks--malicious algorithms that imperceptibly modify input text …

Using bert encoding to tackle the mad-lib attack in sms spam detection

S Rojas-Galeano - arXiv preprint arXiv:2107.06400, 2021 - arxiv.org
One of the stratagems used to deceive spam filters is to substitute vocables with synonyms
or similar words that turn the message unrecognisable by the detection algorithms. In this …

A weak-region enhanced Bayesian classification for spam content-based filtering

V Nosrati, M Rahmani, A Jolfaei… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes an improved Bayesian scheme by focusing on the region in which
Bayesian may fail to correctly identify labels and improve classification performance by …

A Study of Different Awareness Campaigns in a Company

L Gamisch, D Pöhn - Proceedings of the 18th International Conference …, 2023 - dl.acm.org
Phishing is a major cyber threat to organizations that can cause financial and reputational
damage, threatening their existence. The technical measures against phishing should be …

AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks

F Concone, S Gaglio, A Giammanco, GL Re… - ACM Transactions on …, 2024 - dl.acm.org
In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT
systems has driven researchers to investigate the security and reliability of ML techniques. A …