TY - GEN
T1 - Application and evaluation of Bayesian filter for Chinese spam
AU - Zhan, Wang
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2006
Y1 - 2006
N2 - Recently, a statistical filtering based on Bayes theory, socalled Bayesian filtering gain attention when it was described in the paper "A Plan for Spam" by Paul Graham, and has become a popular mechanism to distinguish spam email from legitimate email. Many modern mail programs make use of Bayesian spam filtering techniques. The implementation of the Bayesian filtering corresponding to the email written in English and Japanese has already been developed. On the other hand, few work is conducted on the implementation of the Bayesian spam corresponding to Chinese email. In this paper, firstly, we adopted a statistical filtering called as bsfilter and modified it to filter out Chinese email. When we targeted Chinese emails for experiment, we analyzed the relation between the parameter and the spam judgement accuracy of the filtering, and also considered the optimal parameter values.
AB - Recently, a statistical filtering based on Bayes theory, socalled Bayesian filtering gain attention when it was described in the paper "A Plan for Spam" by Paul Graham, and has become a popular mechanism to distinguish spam email from legitimate email. Many modern mail programs make use of Bayesian spam filtering techniques. The implementation of the Bayesian filtering corresponding to the email written in English and Japanese has already been developed. On the other hand, few work is conducted on the implementation of the Bayesian spam corresponding to Chinese email. In this paper, firstly, we adopted a statistical filtering called as bsfilter and modified it to filter out Chinese email. When we targeted Chinese emails for experiment, we analyzed the relation between the parameter and the spam judgement accuracy of the filtering, and also considered the optimal parameter values.
UR - http://www.scopus.com/inward/record.url?scp=33845947724&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33845947724&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33845947724
SN - 3540496084
SN - 9783540496083
VL - 4318 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 253
EP - 263
BT - Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings
PB - Springer Verlag
T2 - 2nd SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006
Y2 - 29 November 2006 through 1 December 2006
ER -