Application and evaluation of Bayesian filter for Chinese spam

Wang Zhan, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Recently, a statistical filtering based on Bayes theory, socalled Bayesian filtering gain attention when it was described in the paper "A Plan for Spam" by Paul Graham, and has become a popular mechanism to distinguish spam email from legitimate email. Many modern mail programs make use of Bayesian spam filtering techniques. The implementation of the Bayesian filtering corresponding to the email written in English and Japanese has already been developed. On the other hand, few work is conducted on the implementation of the Bayesian spam corresponding to Chinese email. In this paper, firstly, we adopted a statistical filtering called as bsfilter and modified it to filter out Chinese email. When we targeted Chinese emails for experiment, we analyzed the relation between the parameter and the spam judgement accuracy of the filtering, and also considered the optimal parameter values.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings
PublisherSpringer Verlag
Pages253-263
Number of pages11
Volume4318 LNCS
ISBN (Print)3540496084, 9783540496083
Publication statusPublished - 2006
Event2nd SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006 - Beijing, China
Duration: Nov 29 2006Dec 1 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4318 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006
CountryChina
CityBeijing
Period11/29/0612/1/06

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Application and evaluation of Bayesian filter for Chinese spam'. Together they form a unique fingerprint.

Cite this