{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:39:28Z","timestamp":1766158768329,"version":"3.40.5"},"reference-count":50,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802077"],"award-info":[{"award-number":["61802077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Intell Syst"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1002\/int.22625","type":"journal-article","created":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T07:27:22Z","timestamp":1629271642000},"page":"287-304","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3745-5669","authenticated-orcid":false,"given":"Wenjuan","family":"Li","sequence":"first","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"},{"name":"Department of Electronic and Information Engineering The Hong Kong Polytechnic University Hong Kong China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5279-5795","authenticated-orcid":false,"given":"Lishan","family":"Ke","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information Science Guangzhou University Guangdong China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong China"},{"name":"Department of Applied Mathematics and Computer Science Technical University of Denmark Lyngby Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4993-9452","authenticated-orcid":false,"given":"Jinguang","family":"Han","sequence":"additional","affiliation":[{"name":"Jiangsu Provincial Key Laboratory of E\u2010Business Nanjing University of Finance and Economics Nanjing China"}]}],"member":"311","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"unstructured":"Gartner report. Accessed September 2020.https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io","key":"e_1_2_9_2_1"},{"unstructured":"451 Research. Accessed September 2020.https:\/\/www.iot-now.com\/tag\/451-research\/","key":"e_1_2_9_3_1"},{"doi-asserted-by":"crossref","unstructured":"LiW MengW TanZ XiangY. Towards designing an email classification system using multi\u2010view based semi\u2010supervised learning. Proceedings of TrustCom;2014:174\u2010181.","key":"e_1_2_9_4_1","DOI":"10.1109\/TrustCom.2014.26"},{"unstructured":"ShcherbakovaT VergelisM. Spam report: February 2014; March2014.http:\/\/securelist.com\/analysis\/monthly-spam-reports\/58559\/spam-report-february-2014\/","key":"e_1_2_9_5_1"},{"unstructured":"BrutlagJ MeekC. Challenges of the email domain for text classification. Proceedings of ICML;2000:103\u2010110.","key":"e_1_2_9_6_1"},{"unstructured":"Spam in Q1 2014: US once again the prime target for malicious emails; May2014.http:\/\/www.kaspersky.com\/about\/news\/spam\/2014\/Spam-in-Q1-2014-US-Once-Again-the-Prime-Target-for-Malicious-Emails","key":"e_1_2_9_7_1"},{"unstructured":"Spam and phishing in Q2;2020.https:\/\/securelist.com\/spam-and-phishing-in-q2-2020\/97987\/","key":"e_1_2_9_8_1"},{"doi-asserted-by":"crossref","unstructured":"IslamR XiangY. Email classification using data reduction method. Proceedings of ChinaCom;2010:1\u20105.","key":"e_1_2_9_9_1","DOI":"10.4108\/chinacom.2010.59"},{"doi-asserted-by":"publisher","key":"e_1_2_9_10_1","DOI":"10.1111\/exsy.12136"},{"issue":"3","key":"e_1_2_9_11_1","first-page":"949","article-title":"Spam email classification using decision tree ensemble","volume":"8","author":"Shi L","year":"2012","journal-title":"J Comput Inform Syst"},{"doi-asserted-by":"publisher","key":"e_1_2_9_12_1","DOI":"10.1007\/s10462-010-9166-x"},{"unstructured":"MarsonoMN El\u2010KharashiMW GebaliF. Binary LNS\u2010based naive Bayes hardware classifier for spam control. Proceedings of IEEE International Symposium on Circuits and Systems.2006:3674\u20103677.","key":"e_1_2_9_13_1"},{"doi-asserted-by":"crossref","unstructured":"FirteL LemnaruC PotoleaR. Spam detection filter using KNN algorithm and resampling. Proceedings of ICCP.2010:27\u201033.","key":"e_1_2_9_14_1","DOI":"10.1109\/ICCP.2010.5606466"},{"doi-asserted-by":"publisher","key":"e_1_2_9_15_1","DOI":"10.1016\/j.knosys.2020.105918"},{"doi-asserted-by":"publisher","key":"e_1_2_9_16_1","DOI":"10.1080\/18756891.2013.802114"},{"doi-asserted-by":"publisher","key":"e_1_2_9_17_1","DOI":"10.1016\/j.comcom.2013.11.001"},{"doi-asserted-by":"crossref","unstructured":"MengY LiW KwokLF. Enhancing email classification using data reduction and disagreement\u2010based semi\u2010supervised learning. Proceedings of ICC.2014:622\u2010627.","key":"e_1_2_9_18_1","DOI":"10.1109\/ICC.2014.6883388"},{"doi-asserted-by":"publisher","key":"e_1_2_9_19_1","DOI":"10.1142\/S0219649219500084"},{"doi-asserted-by":"publisher","key":"e_1_2_9_20_1","DOI":"10.1016\/j.jnca.2008.02.023"},{"doi-asserted-by":"crossref","unstructured":"ZhangW ZhuD ZhangY ZhouG XuB. Harmonic functions based semi\u2010supervised learning for web spam detection. Proceedings of SAC.2011:74\u201075.","key":"e_1_2_9_21_1","DOI":"10.1145\/1982185.1982204"},{"doi-asserted-by":"crossref","unstructured":"LiW MengW. An empirical study on email classification using supervised machine learning in real environments. The 2015 IEEE International Conference on Communications (ICC 2015) IEEE;2015:7438\u20107443.","key":"e_1_2_9_22_1","DOI":"10.1109\/ICC.2015.7249515"},{"doi-asserted-by":"crossref","unstructured":"HuntR.CarpinterJ. Current and new developments in spam filtering. Proceedings of ICON.2006:1\u20106.","key":"e_1_2_9_23_1","DOI":"10.1109\/ICON.2006.302641"},{"unstructured":"SinhaS BaileyM JahanianF. Shades of grey: On the effectiveness of reputation\u2010based blacklists. Proceedings of MALWARE.2008:57\u201064.","key":"e_1_2_9_24_1"},{"doi-asserted-by":"crossref","unstructured":"WestAG AvivAJ ChangJ LeeI. Spam mitigation using spatio\u2010temporal reputations from blacklist history. Proceedings of ACSAC.2010:161\u2010170.","key":"e_1_2_9_25_1","DOI":"10.1145\/1920261.1920287"},{"unstructured":"MouraGCM SperottoA SadreR PrasA. Evaluating third\u2010party Bad Neighborhood blacklists for Spam detection. Proceedings of IFIP\/IEEE IM.2013:252\u2010259.","key":"e_1_2_9_26_1"},{"doi-asserted-by":"crossref","unstructured":"LiuJ RahbariniaB PerdisciR DuH SuL. Augmenting telephone spam blacklists by mining large CDR datasets. AsiaCCS;2018:273\u2010284.","key":"e_1_2_9_27_1","DOI":"10.1145\/3196494.3196553"},{"doi-asserted-by":"publisher","key":"e_1_2_9_28_1","DOI":"10.1016\/j.comnet.2006.11.015"},{"doi-asserted-by":"crossref","unstructured":"RamachandranA FeamsterN VempalaS. Filtering spam with behavioral blacklisting. Proceedings of ACM CCS.2007:342\u2010351.","key":"e_1_2_9_29_1","DOI":"10.1145\/1315245.1315288"},{"doi-asserted-by":"publisher","key":"e_1_2_9_30_1","DOI":"10.1016\/j.jnca.2011.06.004"},{"doi-asserted-by":"crossref","unstructured":"ChenC TianY ZhangC. Spam filtering with several novel Bayesian classifiers. Proceedings of ICPR.2008:1\u20104.","key":"e_1_2_9_31_1","DOI":"10.1109\/ICPR.2008.4761531"},{"issue":"2","key":"e_1_2_9_32_1","first-page":"236","article-title":"A method for spam behavior recognition based on fuzzy decision tree","author":"Wang M","year":"2009","journal-title":"CIT"},{"doi-asserted-by":"publisher","key":"e_1_2_9_33_1","DOI":"10.1016\/j.knosys.2014.03.015"},{"doi-asserted-by":"publisher","key":"e_1_2_9_34_1","DOI":"10.1108\/JSIT-11-2017-0105"},{"doi-asserted-by":"crossref","unstructured":"PrilepokM KudelkaM. Spam detection based on nearest community classifier. INCoS.2015:354\u2010359.","key":"e_1_2_9_35_1","DOI":"10.1109\/INCoS.2015.75"},{"doi-asserted-by":"publisher","key":"e_1_2_9_36_1","DOI":"10.1109\/72.788645"},{"doi-asserted-by":"crossref","unstructured":"SculleyD WachmanGM. Relaxed online SVMs for spam filtering. Proceedings of ACM SIGIR.2007:415\u2010422.","key":"e_1_2_9_37_1","DOI":"10.1145\/1277741.1277813"},{"doi-asserted-by":"crossref","unstructured":"CaruanaG LiM QiM. A mapreduce based parallel svm for large scale spam filtering. FSKD.2011:2659\u20102662.","key":"e_1_2_9_38_1","DOI":"10.1109\/FSKD.2011.6020074"},{"doi-asserted-by":"crossref","unstructured":"KhamisSA FoozyCFM AzizMFA RahimN. Header based email spam detection framework using support vector machine (SVM) technique. SCDM.2020:57\u201065.","key":"e_1_2_9_39_1","DOI":"10.1007\/978-3-030-36056-6_6"},{"doi-asserted-by":"crossref","unstructured":"WangJ GaoK JiaoY LiG. Study on ensemble classification methods towards spam filtering. Proceedings of ADMA.2009:314\u2010325.","key":"e_1_2_9_40_1","DOI":"10.1007\/978-3-642-03348-3_31"},{"doi-asserted-by":"crossref","unstructured":"ZhenY XiangfeiN WeiranX JunG. An approach to spam detection by Naive bayes ensemble based on decision induction. Proceedings of ISDA.2006:861\u2010866.","key":"e_1_2_9_41_1","DOI":"10.1109\/ISDA.2006.253725"},{"doi-asserted-by":"publisher","key":"e_1_2_9_42_1","DOI":"10.1016\/j.jnca.2018.12.002"},{"unstructured":"The University of Waikato. WEKA\u2010Waikato Environment for Knowledge Analysis.http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/","key":"e_1_2_9_43_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_44_1","DOI":"10.1016\/j.asoc.2011.01.043"},{"doi-asserted-by":"crossref","unstructured":"AbawajyJH KelarevAV. A multi\u2010tier ensemble construction of classifiers for phishing email detection and filtering. CSS 2012;2012:48\u201056.","key":"e_1_2_9_45_1","DOI":"10.1007\/978-3-642-35362-8_5"},{"unstructured":"Spam dataset.http:\/\/web.cs.wpi.edu\/%7Ecs4445\/b12\/Datasets\/spambase.arff","key":"e_1_2_9_46_1"},{"doi-asserted-by":"publisher","key":"e_1_2_9_47_1","DOI":"10.1016\/j.future.2019.02.064"},{"issue":"102631","key":"e_1_2_9_48_1","first-page":"1","article-title":"Enhancing collaborative intrusion detection via disagreement\u2010based semi\u2010supervised learning in iot environments","volume":"161","author":"Li W","year":"2020","journal-title":"J Network and Computer Applications"},{"doi-asserted-by":"publisher","key":"e_1_2_9_49_1","DOI":"10.1016\/j.cose.2014.02.006"},{"doi-asserted-by":"publisher","key":"e_1_2_9_50_1","DOI":"10.1016\/j.jnca.2013.05.009"},{"doi-asserted-by":"publisher","key":"e_1_2_9_51_1","DOI":"10.1002\/cpe.5101"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22625","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.22625","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T19:43:35Z","timestamp":1725651815000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.22625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1002\/int.22625"],"URL":"https:\/\/doi.org\/10.1002\/int.22625","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"type":"print","value":"0884-8173"},{"type":"electronic","value":"1098-111X"}],"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2020-12-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}