Using Cellular Automata for Improving KNN Based Spam Filtering

被引:0
作者
Barigou, Fatiha [1 ]
Beldjilali, Bouziane [1 ]
Atmani, Baghdad [1 ]
机构
[1] Univ Oran, Comp Sci Lab, Oran, Algeria
关键词
Spam e-mail filtering; machine learning; KNN; cellular automata; instance selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As rapid growth over the Internet nowadays, electronic mail (e-mails) has become a popular communication tool. However, junk mail also, known as spam has increasingly become a part of life for users as well as internet service providers. To address this problem, many solutions have been proposed in the last decade. Currently, content-based anti-spam filtering methods are an important issue; the spam filtering is considered as a special case of binary text categorization. Many machine learning techniques have been developed and applied to classify email as spam or non-spam. In this paper, we proposed an enhanced K-Nearest Neighbours (KNN) method called Cellular Automaton Combined with KNN (CA-KNN) for spam filtering. In our proposed method, a cellular automaton is used to identify which instances in training set should be selected to classify a new e-mail; CA-KNN selects the nearest neighbours not from the whole training set, but only from a reduced subset selected by a cellular automaton.
引用
收藏
页码:345 / 353
页数:9
相关论文
共 28 条
[1]  
Androutsopoulos I., 2000, Proceedings of the Workshop on Machine Learning in the New Information Age, P9
[2]  
Androutsopoulos Ion., 2000, P WORKSHOP MACHINE L, P1
[3]  
[Anonymous], 1997, ICML
[4]   AUTOMATED LEARNING OF DECISION RULES FOR TEXT CATEGORIZATION [J].
APTE, C ;
DAMERAU, F ;
WEISS, SM .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 1994, 12 (03) :233-251
[5]  
Atmani B, 2007, COMPUT INFORM, V26, P171
[6]  
Barigou F., 2012, COMMUN COMPUT PHYS, V293, P78
[7]  
Barigou N., 2011, P INT C COMM COMP CO, P450, DOI DOI 10.1109/CCCA.2011.6031517
[8]   Tightening the net: A review of current and next generation spam filtering tools [J].
Carpinter, James ;
Hunt, Ray .
COMPUTERS & SECURITY, 2006, 25 (08) :566-578
[9]  
Carreras X., 2001, P 4 INT C RECENT ADV, P58
[10]  
Cohen W., 1996, AAAI Sump. On Machine Learning in Inf Access, P18