Paper
25 May 2023 Experimental study of spam classifier based on naive Bayesian model
Teng Lv, Ping Yan
Author Affiliations +
Proceedings Volume 12636, Third International Conference on Machine Learning and Computer Application (ICMLCA 2022); 1263627 (2023) https://doi.org/10.1117/12.2675137
Event: Third International Conference on Machine Learning and Computer Application (ICMLCA 2022), 2022, Shenyang, China
Abstract
These days, we are bombarded with endless spam e-mails. A survey showed that spam accounts for over 70% of all emails. The harm of spam to our daily life includes: spam usually has fraud and unhealthy contents, which requires a vast waste of network bandwidth to transfer spam, and vast waste of space to store spam. As spam is usually embedded in normal e-mails, it is difficult to identify them. In this paper, main technologies to identify and block spam are analyzed including information filtering, blacklist and white list, and intention analysis. Then two experiments of different settings are conducted and analyzed to show how different settings affects the accuracy, precision, recall, and f1_score of the model: the first experiment shows how different thresholds are set to determine whether an e-mail is a spam or not effects the accuracy, precision, recall, and f1_score of the model, the second experiment shows the effects on accuracy, precision, recall, and f1_score of the model when training set is bigger than test set.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Teng Lv and Ping Yan "Experimental study of spam classifier based on naive Bayesian model", Proc. SPIE 12636, Third International Conference on Machine Learning and Computer Application (ICMLCA 2022), 1263627 (25 May 2023); https://doi.org/10.1117/12.2675137
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Tunable filters

Data modeling

Sampling rates

Information technology

Internet

Information security

Network security

Back to Top