期刊文献+

基于贝叶斯算法的垃圾短信过滤系统的设计与实现 被引量:1

The Design and Implementation of Junk SMS Filtering System Based on Bayes
下载PDF
导出
摘要 随着手机短信应用日益广泛,垃圾短信也随之大量出现,并严重影响到人们的正常生活及社会的安全与稳定。针对现有手机端垃圾过滤系统的不足,该文介绍了一种基于贝叶斯算法的垃圾短信过滤系统的实现方法,以取得更好的过滤效果。 With the increasingly widespread application of SMS,junk SMS appeared in large numbers,and seriously affect the security and stability of people's normal life and society.For the deficiencies of the existing junk SMS filtering system,this paper proposes a method to fil ter junk SMS based on Bayes to achieve better filtering effect.
作者 蒋永辉
出处 《电脑知识与技术》 2012年第5X期3665-3667,共3页 Computer Knowledge and Technology
关键词 垃圾短信过滤 贝叶斯算法 junk SMS filtering Bayes
  • 相关文献

参考文献7

二级参考文献61

共引文献55

同被引文献17

  • 1朱雪彤,王永利.移动社交网络中用户上下文的自动识别与共享[J].南京理工大学学报,2013,37(4):500-505. 被引量:4
  • 2潘志方.基于朴素贝叶斯学习的电子商务网站客户兴趣分类的应用研究[J].计算机科学,2007,34(6):214-215. 被引量:4
  • 3Turtle H, Croft W B. Inference networks for document retrieval [ C]//Proceedings of the 13th Annual International ACM SIGIR Conference on Research and Dewlopment in Information Retrieval.Netherlands:ACM, 1989:1-24. 被引量:1
  • 4Callan J. Document filtering with inference networks [ C ]//Pro- ceedings of the 19th annual international ACM SIGIR conference on Research and development in information retrieval. Netherlands: Springer, ACM, 1996 : 262 - 269. 被引量:1
  • 5Sahami M, Dumais S, Heckerman D, et al. A Bayesian approach to filtering junk e - mail [ C ]//Learning for Text Categorization: Papers from the 1998 Workshop. Menlo Park: the AAAI Press, 1998, 62 : 98 - 105. 被引量:1
  • 6Hovold J. Naive bayes spam filtering using word - position - based attributes [C]//The 2nd Conference on Email and Anti -Spam. Mountain View: Betascript Publishing,2005. 被引量:1
  • 7Metsis V, Androutsopoulos I, Paliouras C. Spam filtering with naive bayes - which naive bayes? [ C ]// The Third Conference on Email and Anti -Spam. Mountain View: Betascript Publishing, 2006:27 - 28. 被引量:1
  • 8Liu Wuying, Wang Ting. Unimodel - based multi - source portable spam filtering [ C ]//Fifth International Conference on Fuzzy Sys- tems and Knowledge Discovery. Chongqing: Chongqing University of Posts and Telecommunications, 2008:540 -544. 被引量:1
  • 9Sehuhz M G, Eskin E,Zadok E,et al. Data mining methods for de- tection of new malicious executables [ C //Titsworth F M. The Pro- ceedings of 2001 IEEE Symposium on Security and Privacy. Flori- da: The Printing House, 2001 : 38 -49. 被引量:1
  • 10Nusrat S, Vassileva J. Recommending services in a trust - based decentralized user modeling system [ J ]. Advances in User Modeling Lecture Notes in Computer Science ,2012 (7138 ) : 230 - 242. 被引量:1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部