Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning for email spam filtering: review, approaches and open research problems
The upsurge in the volume of unwanted emails called spam has created an intense need for
the development of more dependable and robust antispam filters. Machine learning …
the development of more dependable and robust antispam filters. Machine learning …
A review of machine learning approaches to spam filtering
In this paper, we present a comprehensive review of recent developments in the application
of machine learning algorithms to Spam filtering, focusing on both textual-and image-based …
of machine learning algorithms to Spam filtering, focusing on both textual-and image-based …
[کتاب][B] Recommender systems: an introduction
D Jannach, M Zanker, A Felfernig, G Friedrich - 2010 - books.google.com
In this age of information overload, people use a variety of strategies to make choices about
what to buy, how to spend their leisure time, and even whom to date. Recommender …
what to buy, how to spend their leisure time, and even whom to date. Recommender …
Mining data with random forests: A survey and results of new tests
Random forests (RF) has become a popular technique for classification, prediction, studying
variable importance, variable selection, and outlier detection. There are numerous …
variable importance, variable selection, and outlier detection. There are numerous …
An improved K-nearest-neighbor algorithm for text categorization
Text categorization is a significant tool to manage and organize the surging text data. Many
text categorization algorithms have been explored in previous literatures, such as KNN …
text categorization algorithms have been explored in previous literatures, such as KNN …
Classification of phishing email using random forest machine learning technique
Phishing is one of the major challenges faced by the world of e‐commerce today. Thanks to
phishing attacks, billions of dollars have been lost by many companies and individuals. In …
phishing attacks, billions of dollars have been lost by many companies and individuals. In …
A brief survey on anonymization techniques for privacy preserving publishing of social network data
Nowadays, partly driven by many Web 2.0 applications, more and more social network data
has been made publicly available and analyzed in one way or another. Privacy preserving …
has been made publicly available and analyzed in one way or another. Privacy preserving …
Investigating the effect of dataset size, metrics sets, and feature selection techniques on software fault prediction problem
Software quality engineering comprises of several quality assurance activities such as
testing, formal verification, inspection, fault tolerance, and software fault prediction. Until …
testing, formal verification, inspection, fault tolerance, and software fault prediction. Until …
A novel hybrid whale optimization algorithm with flower pollination algorithm for feature selection: Case study Email spam detection
Feature selection (FS) in data mining is one of the most challenging and most important
activities in pattern recognition. In this article, a new hybrid model of whale optimization …
activities in pattern recognition. In this article, a new hybrid model of whale optimization …
Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems
Nowadays, emails are used across almost every field, spanning from business to education.
Broadly, emails can be categorized as either ham or spam. Email spam, also known as junk …
Broadly, emails can be categorized as either ham or spam. Email spam, also known as junk …