Computer Science ›› 2017, Vol. 44 ›› Issue (9): 74-77.doi: 10.11896/j.issn.1002-137X.2017.09.015
Previous Articles Next Articles
YUAN Guo-xin and YU Hong
[1] Internet Society of China.China anti-spam survey report in the first quarter of 2014 [J].China Internet,2014(7):59-67.(in Chinese) 中国互联网协会.2014年第一季度反垃圾邮件调查报告[J].互联网天地,2014(7):59-67. [2] CHEN Z X.Review of spam filtering technology[J].Application Research of Computers,2009,26(5):1612-1615(in Chinese) 陈志贤.垃圾邮件过滤技术研究综述[J].计算机应用研究,2009,26(5):1612-1615. [3] YAO Y Y.Three-Way Decision:An Interpretation of Rules in Rough Set Theory[M]∥Rough Sets and Knowledge Technology.Springer Berlin Heidelberg,2009:642-649. [4] YAO Y Y.Three-way decisions with probabilistic rough sets[J].Information Sciences,2010,180(3):341-353. [5] YAO Y Y.An Outline of a Theory of Three-Way Decisions[M]∥Rough Sets and Current Trends in Computing.Springer Berlin Heidelberg,2012:1-17. [6] LI J L,DENG X F,YAO Y Y.Multistage Email Spam Filtering Based on Three-Way Decisions[M]∥Rough Sets and Know-ledge Technology.Springer Berlin Heidelberg,2013:313-324. [7] ZHOU B,YAO Y Y,LUO J G.Cost-sensitive three-way email spam filtering [J].Journal of Intelligent Information Systems,2014,2(1):19-45. [8] JIA Y X,SHANG L.Three-Way Decision Versus Two-Way Decisions on Filtering Spam Email[M]∥Transactions on Rough Sets XVIII.Springer Berlin Heidelberg,2014:69-91. [9] DENG W B,HONG Z Y.Two stage email filtering methodbased on rough set[J].Journal of Computer Applications,2010,30(8):2006-2009,8. [10] PAWLAK Z.Rough sets [J].International Journal of Computer and Information Sciences,1982,11(5):341-356. [11] YAO Y Y.Decision-Theoretic Rough Set Models[C]∥International Conference on Rough Sets and Knowledge Technology.New York:Springer-Verlag,2007:1-12. [12] MARINOFF L.The Middle Way:Finding Happiness in a World of Extremes[M].New York:Sterling,2007. [13] 贾修一,等.三支决策理论与应用[M].南京:南京大学出版社,2012. [14] 于洪等.三支决策:复杂问题求解方法与实践[M].北京:科学出版社,2015. [15] PAWLAK Z.Rough sets:Theoretical aspects of reasoning about data[M].London:Kluwer Academic Publishers,1991. [16] LIANG J Y,QIAN Y H.Information granules and entropy theory in information systems [J].Science in China-Series,2008,51(3):1427-1444. [17] YE J,ZHU H S,LI M.Kind of attribute importance definedmethod and its application in attribute reduction [J].Application Research of Computers,2016,33(7):2075-2078.(in Chinese) 叶军,朱华生,黎敏.一种属性重要性定义方法及其在约简中的应用[J].计算机应用研究,2016,33(7):2075-2078. [18] Text Retrieval Conference.2006 TREC Public Spam Corpora[EB/OL].[2016-04-21].http://plg.uwaterloo.ca/cgi-bin/cgiwrap/gvcormac/foo06. |
No related articles found! |
|