Term-weighting approaches in automatic text retrieval
Information Processing and Management: an International Journal
User interactions with everyday applications as context for just-in-time information access
Proceedings of the 5th international conference on Intelligent user interfaces
SIGIR '00 Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval
On Applying an Image Processing Technique to Detecting Spams
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
Spam and the ongoing battle for the inbox
Communications of the ACM - Spam and the ongoing battle for the inbox
International Journal of Web and Grid Services
Web browsing behavior recording system
KES'11 Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part IV
Tag recommendation for flickr using web browsing behavior
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
Hi-index | 0.00 |
We focus on user behaviour that most e-mail users browse the web. In this paper, we attempt to exploit user preference extracted from the behaviour in a spam filtering method. The method reduces troublesome maintenance of the filter, since it keeps track of user preference as ham words in background. The ham words are used to determine whether a received e-mail is a ham or not. The method can detect some spams which are hard to classify correctly by existing Bayesian filters. We show that a combination of a Bayesian filter and our method reduces the number of false negatives.