{"id":"https://openalex.org/W2024631725","doi":"https://doi.org/10.1145/2499788.2499799","title":"A structure free self-adaptive piecewise hashing algorithm for spam filtering","display_name":"A structure free self-adaptive piecewise hashing algorithm for spam filtering","publication_year":2013,"publication_date":"2013-08-17","ids":{"openalex":"https://openalex.org/W2024631725","doi":"https://doi.org/10.1145/2499788.2499799","mag":"2024631725"},"language":"en","primary_location":{"id":"doi:10.1145/2499788.2499799","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2499788.2499799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052097137","display_name":"Junxing Zhu","orcid":"https://orcid.org/0000-0001-5221-1318"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junxing Zhu","raw_affiliation_strings":["National University of Defense Technology, Changsha City, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha City, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081729072","display_name":"Aiping Li","orcid":"https://orcid.org/0000-0001-6174-0991"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aiping Li","raw_affiliation_strings":["National University of Defense Technology, Changsha City, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha City, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100956364","display_name":"Xiaoning Xu","orcid":"https://orcid.org/0000-0001-9507-7171"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoning Xu","raw_affiliation_strings":["National University of Defense Technology, Changsha City, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha City, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052097137"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16671091,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"335","last_page":"340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7365047931671143},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6999115943908691},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6789735555648804},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6635552644729614},{"id":"https://openalex.org/keywords/piecewise","display_name":"Piecewise","score":0.48296040296554565},{"id":"https://openalex.org/keywords/algorithm-design","display_name":"Algorithm design","score":0.4188206195831299},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17895108461380005}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7365047931671143},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6999115943908691},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6789735555648804},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6635552644729614},{"id":"https://openalex.org/C164660894","wikidata":"https://www.wikidata.org/wiki/Q2037833","display_name":"Piecewise","level":2,"score":0.48296040296554565},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.4188206195831299},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17895108461380005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2499788.2499799","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2499788.2499799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1097356624","display_name":null,"funder_award_id":"60933005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1907387567","display_name":null,"funder_award_id":"2010AA012505, 2011AA010702","funder_id":"https://openalex.org/F4320321540","funder_display_name":"Ministry of Science and Technology of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321540","display_name":"Ministry of Science and Technology of the People's Republic of China","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1450699660","https://openalex.org/W1519919627","https://openalex.org/W1973644085","https://openalex.org/W2000369940","https://openalex.org/W2004025009","https://openalex.org/W2014179354","https://openalex.org/W2018000323","https://openalex.org/W2038982432","https://openalex.org/W2118020653","https://openalex.org/W2126719924","https://openalex.org/W2152565070","https://openalex.org/W2153180170","https://openalex.org/W2168154523","https://openalex.org/W2169270715","https://openalex.org/W2373176321","https://openalex.org/W2384702298","https://openalex.org/W2467251331","https://openalex.org/W6685179926"],"related_works":["https://openalex.org/W2393888177","https://openalex.org/W2544423928","https://openalex.org/W2967268719","https://openalex.org/W2115794623","https://openalex.org/W3115392711","https://openalex.org/W2360264381","https://openalex.org/W2067173559","https://openalex.org/W1613730747","https://openalex.org/W2541389358","https://openalex.org/W4318948887"],"abstract_inverted_index":{"Nowadays,":[0],"email":[1],"spam":[2,9,120],"problem":[3],"continues":[4],"growing":[5],"drastically":[6],"and":[7,73,89,99,114],"many":[8],"detection":[10],"algorithms":[11],"have":[12],"been":[13],"developed":[14],"at":[15],"the":[16,66,83,95,100,111],"same":[17],"time.":[18],"However,":[19],"there":[20],"are":[21,63],"several":[22,79],"shortcomings":[23],"shared":[24],"by":[25,91],"most":[26],"of":[27,61,116],"these":[28,34],"algorithms.":[29],"In":[30],"order":[31],"to":[32,81],"solve":[33],"shortcomings,":[35],"we":[36,77],"present":[37],"a":[38],"structure":[39],"free":[40],"Self-adaptive":[41],"piecewise":[42],"hashing":[43],"algorithm(SFSPH)":[44],"together":[45],"with":[46,94],"its":[47],"super":[48],"method(SFSPH-S,":[49],"which":[50],"is":[51],"much":[52],"faster":[53],"than":[54],"SFSPH":[55],"but":[56],"has":[57],"lower":[58],"accuracy).":[59],"Both":[60],"them":[62,93],"based":[64],"on":[65,105],"extremum":[67],"characteristic":[68],"theory,":[69],"robin":[70],"fingerprint":[71],"algorithm":[72,98,118],"optimization":[74],"theory.":[75],"Then":[76],"designed":[78],"experiments":[80,109],"evaluate":[82],"algorithms'":[84],"performance,":[85],"including":[86],"accuracy,":[87],"speed":[88],"robustness,":[90],"comparing":[92],"famous":[96],"DSC":[97],"Email":[101],"Remove-duplicate":[102],"Algorithm":[103],"Based":[104],"SHA-1(ERABS).":[106],"Our":[107],"extensive":[108],"demonstrated":[110],"good":[112],"performance":[113],"accuracy":[115],"our":[117],"for":[119],"filtering.":[121]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
