|
[1] MessageLabs Intelligence Reports: http://www.messagelabs.com/mlireport/MessageLabsIntelligence_2010_Annual_Report_FINAL.pdf [2] M. Sahami, S. Dumais, D. Heckerman, and E. Horviz, “A Bayesian approach to filtering junk e-mail,” AAAI’98 Workshop on Learning for Text Categorization, July 1998. [3] M. Uemura and T. Tabata, “Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method,” International Conference on Information Security and Assurance, pp. 46-51, May 2008. [4] H. Drucker, D. Wu, and V. N. Vapnik, “Support Vector Machines for Spam Categorization,” IEEE Transactions on Neural networks, vol. 10, no. 5, September 1999. [5] The Official CAPTCHA Website: http://www.captcha.net/ [6] G. Fumera, I. Pillai, and F. Roli, “Spam filtering based on the analysis of text information embedded into images,” Journal of Machine Learning Research, vol. 7, pp. 2699-2720, June 1999. [7] M. Dredze, R. Gevaryahu, and A. Elias-Bachrach, “Learning Fast Classifiers for Image Spam,” Proceedings of the fourth conference on email and anti-spam, August 2007. [8] F. Gargiulo, A. Penta, A. Picariello, and C. Sansone, “Using Heterogeneous Features for Anti-spam Filters,” Proceedings of the 19th International Conference on Database and Expert Systems Application, pp. 670-674, September 2008. [9] Q. Liu, Z.Q. Qin, H.R. Cheng, and M.C. Wan, “Efficient Modeling of Spam Images,” Proceedings of the third International Symposium on Intelligent Information Technology and Security Informatics, pp. 663-666, April 2010. [10] H. B. Aradhye, G. K. Myers, and J. A. Herson, “Image Analysis for Efficient Categorization of Image-based Spam E-mail,” Proceedings of the Eighth International Conference on Document Analysis and Recognition, vol 2, pp. 914-918, September 2005. [11] Z. Wang, W. Josephson, Q. Lv, M. Charikar, and K. Li, “Filtering Image Spam with Near-Duplicate Detection,” Proceedings of the Fourth Conference on Email and Anti-Spam, August 2007. [12] T.J. Liu, W.L. Tsao, and C.L. Lee, “A High Performance Image-Spam Filtering System,” IEEE Proceedings of the Ninth International Symposium on Distributed Computing and Applications to Business Engineering and Science, pp. 445-449, August 2010. [13] Y. Gao, M. Yang, and X. Zhao, “Image Spam Hunter,” IEEE International Conference on Acoustics, Speech and Signal Processing, March 2008. [14] B. Byun, C.H. Lee, S. Webb, and C. Pu, “A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification,” 4th Conference on Email and Anti-Spam, August 2007. [15] P. He, X. Wen, and W. Zheng, “A Simple Method for Filtering Image Spam,” IEEE/ACIS International Conference on Computer and Information Science, pp. 910-913, June 2009. [16] C. Cortes and V. Vapnik, MACHINE LEARNING, vol. 20, pp. 273-297, September 1995.
[17] SpamAssasian: http://spamassassin.apache.org/ [18] M. Stricker and M. Orengo, “Similarity of color images,” SPIE Conference on Storage and Retrieval for Image and Video Databases III, vol. 2420, pp. 381-392, February 1995. [19] C. Frankel, M. Swain, and V. Athitsos, “Webseer: An Image Search Engine for the World Wide Web,” Univ. of Chicago Techniacal Report TR96-14, August 1996. [20] G. V. Cormack and A. Bratko, “Batch and Online Spam Filter Comparison,” 3rd Conference on Email and Anti-Spam, July 2006. [21] Distributed Checksum Clearinghouse: http://www.rhyolite.com/dcc/ [22] J. Hu and A. Bagga, “Categorizing images in Web documents,” IEEE MultiMedia, vol. 11, pp. 22-30, January-March, 2004. [23] Y Rui, T. S. Huang, and S.F. Chang, “Image Retrieval: Current Techniques, Promising Directions, and Open Issues,” Journal of Visual Communications and Image Representation, vol. 10, pp. 39-62, April 1999. [24] LIBSVM: http://www.csie.ntu.edu.tw/~cjlin/libsvm/ [25] TREC: http://trec.nist.gov/data/spam.html
|