Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Anti-spam techniques

Known as: Spam Solutions, Anti-spam techniques (email), Spam blacklist 
Various anti-spam techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
The process of learning good features for machine learning applications can be very computationally expensive and may prove… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2011
Review
2011
Consumers increasingly rate, review and research products online (Jansen, 2010; Litvin et al., 2008). Consequently, websites… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Review
2010
Review
2010
Machine learning’s ability to rapidly evolve to changing and complex situations has helped it become a fundamental tool for… Expand
Review
2009
Review
2009
Email spam is one of the major problems of the today’s Internet, bringing financial damage to companies and annoying individual… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2007
Highly Cited
2007
The increasing number of unsolicited e-mail messages (spam) reveals the need for the development of reliable anti-spam filters… Expand
Highly Cited
2007
Highly Cited
2007
A new trend in email spam is the emergence of image spam. Although current anti-spam technologies are quite successful in… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 3
Highly Cited
2006
Highly Cited
2006
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., "tags") to… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Highly Cited
2006
Highly Cited
2006
Evaluating user preferences of web search results is crucial for search engine development, deployment, and maintenance. We… Expand
Highly Cited
2006
Highly Cited
2006
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
Essentially all data mining algorithms assume that the data-generating process is independent of the data miner's activities… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2