SlideShare a Scribd company logo
Motivation
• Text mining + Network effect
SMS corpus
Spam score
Content Analysis
Network Analysis
spam ham
Spam Filtering
System
Many users’ data are needed
Deep Belief Networks (DBNs)
• What is a DBN (for
classification)?
– A feedforward neural network
with a deep architecture - many
hidden layers
– Consists of : visible (input) units,
hidden units, output units (for
classification, one for each class)
• Parameters of a DBN
– W(j) :weights between the units of
layers j-1 and j
– b(j) : biases of layer j (no biases in
the input layer).
Training a DBN
• Conventional approach: Gradient based optimization
– Random initialization of weights and biases
– Adjustment by backpropagation
Optimization algorithms get stuck in poor solutions
due to random initialization
 Solution
– Hinton et al [2006] proposed the use of a greedy layer-
wise unsupervised algorithm for initialization of DBNs
parameters
– Initialization phase: initialize each layer by treating it as a
Restricted Boltzmann Machine (RBM)
Restricted Boltzmann Machines
(RBMs)
• An RBM is a two layer neural network
– Binary inputs (visible units) are connected
to binary outputs (hidden units) using symmetrically weighted
connections
• Parameters of an RBM
– W :weights between the two layers
– b, c :biases for visible and hidden layers respectively
• Layer-to-layer conditional distributions
Bidirectional
Connections
RBM Training
• For every training example
1. Propagate it from visible to hidden units
2. Sample from the conditional
3. Propagate the sample in the opposite direction using
⇒ confabulation of the original data
4. Update the hidden units once more using the confabulation
• Update the RBM parameters
Data vector v
Sample
Sample
Remember that RBM training is
unsupervised
Repeat
DBN Training
1. Train the first layer RBM
2. Stack another hidden
layer on top of the first
RBM & train W(2) as a
second RBM
3. Continue to stack layers
on top of the network,
and train it as previous
step
W(1) ,b(1)
W(2) ,b(2)
W(L) ,b(L)
W(L+1)
random
Good initializations are obtained
Fine tune the whole network by typical supervised criterion (mean square
error, cross-entropy) -> they used conjugate gradients
Dataset
• LingSpam SpamAssassin EnronSpam
Performance Measures
• Accuracy: percentage of correctly classified messages
• Ham - Spam Recall: percentage of correctly classified ham – spam
messages
• Ham - Spam Precision: percentage of messages that are classified
as ham – spam that are indeed ham - spam
Experimental Setup
• Message representation: x=[x1, x2, …, xm]
– Each attribute(message) corresponds to a distinct word from
the corpus
– Use of frequency of the corresponding word
• Attribute selection
– Stop words and words appearing in <2 messages were
removed + Information gain score (m=1500 for LingSpam,
m=1000 for SpamAssassin and EnronSpam)
• All experiments were performed using 10-fold cross
validation
Experimental Setup
• SVM configuration
– Cosine kernel (the usual trend in text classification)
– The cost parameter C must be determined a priori
– Tried many values for C – kept the best
• DBN configuration
– Use of a m-50-50-200-2 DBN architecture (3 hidden layers)
– RBM training was performed using binary vectors for message
representation (the presence or absence of a word in a
message)
Experimental Results
Experimental Results
 The DBN achieves higher accuracy on all
datasets
 Beats the SVM against all measures on
SpamAssassin
 The DBN proved robust to variations on the
number of units of each layer
DBN training is much slower compared to SVM
training
Conclusions
• The effectiveness of the initialization
method was demonstrated in practice
• DBNs constitute a new viable solution to e-
mail filtering
• The selection of the DBN architecture needs
to be addressed in a more systematic way
– Number of layers
– Number of units in each layer
Challenges
• One example of SpamAssassin dataset (email spam)
Hi there,
To be removed please visit:
http://www.supersitescentral.com/rl/remove.html
BIG News...
Visit http://www.supersitescentral.com/rl/x601001.html for full details.
We have discovered a secret to generating a fortune over
the Internet and are looking for a few good people to
share it with.
This could finally be your chance to get that brand new
car and go on that dream vacation you have always wanted.
This is THE BIG ONE! So pay real close attention...
Literally thousands of people are making obscene amounts
of money from the Internet and ecommerce. We found an
Internet giant who markets 11 million products with HUGE
demand in every country around the globe.
You can sit in the comfort of your home making money
hand over fist with a HUGE global market at your
fingertips. Most people never get the opportunity like
this to join *BEFORE* the masses come in.
Consider this:
* Debt Free Multi-Million Dollar Company
* International - in over 180 Countries
* A 100 Billion Dollar Industry
* 3 Year Proven Track Record
* eCommerce Shopping Giant
* Online Marketing Tools
* Phenomenal Support Systems
* Automated Recruiting Systems
* Proprietary Back Office Technology
* Huge Compensation Plan
* Lifetime Residual income
Go to the web site below to get all the details.
http://www.supersitescentral.com/rl/x601001.html
Isn't it your turn to make a fortune over the
Internet? Don't drag your feet on this one. It
could be the one you have been waiting for all
your life.
Talk to you soon,
Mark
iNet Marketing Services
Challenges
[Web발신]
- N H. 금 융 -
더쉽고, 더안전하게
~
7.8 % 로 7000
사.용.하.실.수
있습니다
[Web발신]
크♥사[ㅏ리1.95
로♡ㅂㅔ당+0.05
스♥ㅂL셀1.65
OK♡레알1.49
추쳐닌ck77
time-pr콤
[Web발신]
사-용-중-인
체_크_카_드
빌-려-주-면
월-4-5-0
당-일-진-행
바_로_결_제
[Web발신]
KB국민카드 김소
연님08/18KB국민
카드결제금액
3,500원.잔여포인
트리230(08/06기
준)
<공학인
증>2014-1학기
미상담 시 성적확
인 및 수강신청
제약!! 학기 중 상
담 필수~!!
• In case of Korean Spam SMS..?
1. See the distribution of words
and special characters in spam
and ham messages.
2. Input vector of DBN can be
‘number of special characters’
or ‘how correct the grammar
of message is’ … instead of
‘number of spam words’
Challenges
• How to handle MMS Spam with image..?
• Extract text from image
• Image clustering
• Input vector of DBN can
be image vector

More Related Content

What's hot

Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...Indraneel Pole
 
Generative adversarial networks
Generative adversarial networksGenerative adversarial networks
Generative adversarial networks
남주 김
 
Introduction to CNN
Introduction to CNNIntroduction to CNN
Introduction to CNN
Shuai Zhang
 
Image Compression Using Neural Network
 Image Compression Using Neural Network Image Compression Using Neural Network
Image Compression Using Neural Network
Omkar Lokhande
 
Deep Semi-supervised Learning methods
Deep Semi-supervised Learning methodsDeep Semi-supervised Learning methods
Deep Semi-supervised Learning methods
Princy Joy
 
Explicit Density Models
Explicit Density ModelsExplicit Density Models
Explicit Density Models
Sangwoo Mo
 
Energy based models and boltzmann machines - v2.0
Energy based models and boltzmann machines - v2.0Energy based models and boltzmann machines - v2.0
Energy based models and boltzmann machines - v2.0
Soowan Lee
 
02 Fundamental Concepts of ANN
02 Fundamental Concepts of ANN02 Fundamental Concepts of ANN
02 Fundamental Concepts of ANN
Tamer Ahmed Farrag, PhD
 
Restricted Boltzmann Machines.pptx
Restricted Boltzmann Machines.pptxRestricted Boltzmann Machines.pptx
Restricted Boltzmann Machines.pptx
husseinali674716
 
Canfis
CanfisCanfis
Convolutional neural network
Convolutional neural network Convolutional neural network
Convolutional neural network
Yan Xu
 
Deep neural networks
Deep neural networksDeep neural networks
Deep neural networks
Si Haem
 
P05 deep boltzmann machines cvpr2012 deep learning methods for vision
P05 deep boltzmann machines cvpr2012 deep learning methods for visionP05 deep boltzmann machines cvpr2012 deep learning methods for vision
P05 deep boltzmann machines cvpr2012 deep learning methods for visionzukun
 
Domain adaptation: A Theoretical View
Domain adaptation: A Theoretical ViewDomain adaptation: A Theoretical View
Domain adaptation: A Theoretical View
Chia-Ching Lin
 
Back propagation method
Back propagation methodBack propagation method
Back propagation method
Prof. Neeta Awasthy
 
06 neurolab python
06 neurolab python06 neurolab python
06 neurolab python
Tamer Ahmed Farrag, PhD
 
Support vector machine
Support vector machineSupport vector machine
Support vector machine
zekeLabs Technologies
 
NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis
NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis
NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis
taeseon ryu
 
Resnet.pdf
Resnet.pdfResnet.pdf
Resnet.pdf
YanhuaSi
 
Yann le cun
Yann le cunYann le cun
Yann le cunYandex
 

What's hot (20)

Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
Restricted Boltzmann Machine - A comprehensive study with a focus on Deep Bel...
 
Generative adversarial networks
Generative adversarial networksGenerative adversarial networks
Generative adversarial networks
 
Introduction to CNN
Introduction to CNNIntroduction to CNN
Introduction to CNN
 
Image Compression Using Neural Network
 Image Compression Using Neural Network Image Compression Using Neural Network
Image Compression Using Neural Network
 
Deep Semi-supervised Learning methods
Deep Semi-supervised Learning methodsDeep Semi-supervised Learning methods
Deep Semi-supervised Learning methods
 
Explicit Density Models
Explicit Density ModelsExplicit Density Models
Explicit Density Models
 
Energy based models and boltzmann machines - v2.0
Energy based models and boltzmann machines - v2.0Energy based models and boltzmann machines - v2.0
Energy based models and boltzmann machines - v2.0
 
02 Fundamental Concepts of ANN
02 Fundamental Concepts of ANN02 Fundamental Concepts of ANN
02 Fundamental Concepts of ANN
 
Restricted Boltzmann Machines.pptx
Restricted Boltzmann Machines.pptxRestricted Boltzmann Machines.pptx
Restricted Boltzmann Machines.pptx
 
Canfis
CanfisCanfis
Canfis
 
Convolutional neural network
Convolutional neural network Convolutional neural network
Convolutional neural network
 
Deep neural networks
Deep neural networksDeep neural networks
Deep neural networks
 
P05 deep boltzmann machines cvpr2012 deep learning methods for vision
P05 deep boltzmann machines cvpr2012 deep learning methods for visionP05 deep boltzmann machines cvpr2012 deep learning methods for vision
P05 deep boltzmann machines cvpr2012 deep learning methods for vision
 
Domain adaptation: A Theoretical View
Domain adaptation: A Theoretical ViewDomain adaptation: A Theoretical View
Domain adaptation: A Theoretical View
 
Back propagation method
Back propagation methodBack propagation method
Back propagation method
 
06 neurolab python
06 neurolab python06 neurolab python
06 neurolab python
 
Support vector machine
Support vector machineSupport vector machine
Support vector machine
 
NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis
NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis
NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis
 
Resnet.pdf
Resnet.pdfResnet.pdf
Resnet.pdf
 
Yann le cun
Yann le cunYann le cun
Yann le cun
 

Viewers also liked

Whole Foods Strategic Audit
Whole Foods Strategic AuditWhole Foods Strategic Audit
Whole Foods Strategic Audit
avanrivers
 
STRATEGIC MANAGEMENT
STRATEGIC  MANAGEMENTSTRATEGIC  MANAGEMENT
STRATEGIC MANAGEMENTmariamabdulla
 
Deep Learning for Artificial Intelligence (AI)
Deep Learning for Artificial Intelligence (AI)Deep Learning for Artificial Intelligence (AI)
Deep Learning for Artificial Intelligence (AI)
Er. Shiva K. Shrestha
 
Deep Learning for NLP (without Magic) - Richard Socher and Christopher Manning
Deep Learning for NLP (without Magic) - Richard Socher and Christopher ManningDeep Learning for NLP (without Magic) - Richard Socher and Christopher Manning
Deep Learning for NLP (without Magic) - Richard Socher and Christopher Manning
BigDataCloud
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentationnewsan2001
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
Umar Alharaky
 
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
Carlos Laorden
 
Georgia Tech cse6242 - Intro to Deep Learning and DL4J
Georgia Tech cse6242 - Intro to Deep Learning and DL4JGeorgia Tech cse6242 - Intro to Deep Learning and DL4J
Georgia Tech cse6242 - Intro to Deep Learning and DL4J
Josh Patterson
 
Generating Musical Notes and Transcription using Deep Learning
Generating Musical Notes and Transcription using Deep LearningGenerating Musical Notes and Transcription using Deep Learning
Generating Musical Notes and Transcription using Deep Learning
Varad Meru
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
Mạnh Nguyễn Văn
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
iNazneen
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!
Roelof Pieters
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
Devashish Shanker
 
An Introduction to Supervised Machine Learning and Pattern Classification: Th...
An Introduction to Supervised Machine Learning and Pattern Classification: Th...An Introduction to Supervised Machine Learning and Pattern Classification: Th...
An Introduction to Supervised Machine Learning and Pattern Classification: Th...
Sebastian Raschka
 

Viewers also liked (15)

Whole Foods Strategic Audit
Whole Foods Strategic AuditWhole Foods Strategic Audit
Whole Foods Strategic Audit
 
STRATEGIC MANAGEMENT
STRATEGIC  MANAGEMENTSTRATEGIC  MANAGEMENT
STRATEGIC MANAGEMENT
 
Deep Learning for Artificial Intelligence (AI)
Deep Learning for Artificial Intelligence (AI)Deep Learning for Artificial Intelligence (AI)
Deep Learning for Artificial Intelligence (AI)
 
Deep Learning for NLP (without Magic) - Richard Socher and Christopher Manning
Deep Learning for NLP (without Magic) - Richard Socher and Christopher ManningDeep Learning for NLP (without Magic) - Richard Socher and Christopher Manning
Deep Learning for NLP (without Magic) - Richard Socher and Christopher Manning
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
 
Georgia Tech cse6242 - Intro to Deep Learning and DL4J
Georgia Tech cse6242 - Intro to Deep Learning and DL4JGeorgia Tech cse6242 - Intro to Deep Learning and DL4J
Georgia Tech cse6242 - Intro to Deep Learning and DL4J
 
Generating Musical Notes and Transcription using Deep Learning
Generating Musical Notes and Transcription using Deep LearningGenerating Musical Notes and Transcription using Deep Learning
Generating Musical Notes and Transcription using Deep Learning
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 
An Introduction to Supervised Machine Learning and Pattern Classification: Th...
An Introduction to Supervised Machine Learning and Pattern Classification: Th...An Introduction to Supervised Machine Learning and Pattern Classification: Th...
An Introduction to Supervised Machine Learning and Pattern Classification: Th...
 

Similar to Deep belief networks for spam filtering

Deep Belief Networks for Spam Filtering
Deep Belief Networks for Spam FilteringDeep Belief Networks for Spam Filtering
Deep Belief Networks for Spam Filteringbutest
 
NLP Classifier Models & Metrics
NLP Classifier Models & MetricsNLP Classifier Models & Metrics
NLP Classifier Models & Metrics
Sanghamitra Deb
 
LLMs for the “GPU-Poor” - Franck Nijimbere.pdf
LLMs for the “GPU-Poor” - Franck Nijimbere.pdfLLMs for the “GPU-Poor” - Franck Nijimbere.pdf
LLMs for the “GPU-Poor” - Franck Nijimbere.pdf
GDG Bujumbura
 
Deep learning
Deep learningDeep learning
Deep learning
Aman Kamboj
 
Scalable Deep Learning Using Apache MXNet
Scalable Deep Learning Using Apache MXNetScalable Deep Learning Using Apache MXNet
Scalable Deep Learning Using Apache MXNet
Amazon Web Services
 
cnn ppt.pptx
cnn ppt.pptxcnn ppt.pptx
cnn ppt.pptx
rohithprabhas1
 
Introduction to Convolutional Neural Networks
Introduction to Convolutional Neural NetworksIntroduction to Convolutional Neural Networks
Introduction to Convolutional Neural Networks
ParrotAI
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design TrainingESCOM
 
Deep learning
Deep learningDeep learning
Deep learning
Rouyun Pan
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learning
Junaid Bhat
 
Convolutional neural network
Convolutional neural networkConvolutional neural network
Convolutional neural network
Itachi SK
 
BSSML17 - Deepnets
BSSML17 - DeepnetsBSSML17 - Deepnets
BSSML17 - Deepnets
BigML, Inc
 
distcomp.ppt
distcomp.pptdistcomp.ppt
distcomp.ppt
kaoutarghaffour
 
distcomp.ppt
distcomp.pptdistcomp.ppt
distcomp.ppt
kaoutarghaffour
 
distcomp.ppt
distcomp.pptdistcomp.ppt
distcomp.ppt
Sathya266487
 
The Power of Determinism in Database Systems
The Power of Determinism in Database SystemsThe Power of Determinism in Database Systems
The Power of Determinism in Database Systems
Daniel Abadi
 
A Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVMA Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVM
IRJET Journal
 
DSRLab seminar Introduction to deep learning
DSRLab seminar   Introduction to deep learningDSRLab seminar   Introduction to deep learning
DSRLab seminar Introduction to deep learning
Poo Kuan Hoong
 
Cerebellar Model Articulation Controller
Cerebellar Model Articulation ControllerCerebellar Model Articulation Controller
Cerebellar Model Articulation Controller
Zahra Sadeghi
 

Similar to Deep belief networks for spam filtering (20)

Deep Belief Networks for Spam Filtering
Deep Belief Networks for Spam FilteringDeep Belief Networks for Spam Filtering
Deep Belief Networks for Spam Filtering
 
NLP Classifier Models & Metrics
NLP Classifier Models & MetricsNLP Classifier Models & Metrics
NLP Classifier Models & Metrics
 
LLMs for the “GPU-Poor” - Franck Nijimbere.pdf
LLMs for the “GPU-Poor” - Franck Nijimbere.pdfLLMs for the “GPU-Poor” - Franck Nijimbere.pdf
LLMs for the “GPU-Poor” - Franck Nijimbere.pdf
 
Deep learning
Deep learningDeep learning
Deep learning
 
Scalable Deep Learning Using Apache MXNet
Scalable Deep Learning Using Apache MXNetScalable Deep Learning Using Apache MXNet
Scalable Deep Learning Using Apache MXNet
 
cnn ppt.pptx
cnn ppt.pptxcnn ppt.pptx
cnn ppt.pptx
 
Introduction to Convolutional Neural Networks
Introduction to Convolutional Neural NetworksIntroduction to Convolutional Neural Networks
Introduction to Convolutional Neural Networks
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
Deep learning
Deep learningDeep learning
Deep learning
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learning
 
Convolutional neural network
Convolutional neural networkConvolutional neural network
Convolutional neural network
 
BSSML17 - Deepnets
BSSML17 - DeepnetsBSSML17 - Deepnets
BSSML17 - Deepnets
 
distcomp.ppt
distcomp.pptdistcomp.ppt
distcomp.ppt
 
distcomp.ppt
distcomp.pptdistcomp.ppt
distcomp.ppt
 
distcomp.ppt
distcomp.pptdistcomp.ppt
distcomp.ppt
 
The Power of Determinism in Database Systems
The Power of Determinism in Database SystemsThe Power of Determinism in Database Systems
The Power of Determinism in Database Systems
 
A Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVMA Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVM
 
PCA.pptx
PCA.pptxPCA.pptx
PCA.pptx
 
DSRLab seminar Introduction to deep learning
DSRLab seminar   Introduction to deep learningDSRLab seminar   Introduction to deep learning
DSRLab seminar Introduction to deep learning
 
Cerebellar Model Articulation Controller
Cerebellar Model Articulation ControllerCerebellar Model Articulation Controller
Cerebellar Model Articulation Controller
 

More from SOYEON KIM

Network-based machine learning approach for aggregating multi-modal data
Network-based machine learning approach for aggregating multi-modal dataNetwork-based machine learning approach for aggregating multi-modal data
Network-based machine learning approach for aggregating multi-modal data
SOYEON KIM
 
Revealing disease-associated pathways by network integration of untargeted me...
Revealing disease-associated pathways by network integration of untargeted me...Revealing disease-associated pathways by network integration of untargeted me...
Revealing disease-associated pathways by network integration of untargeted me...
SOYEON KIM
 
Systems genetics approaches to understand complex traits
Systems genetics approaches to understand complex traitsSystems genetics approaches to understand complex traits
Systems genetics approaches to understand complex traits
SOYEON KIM
 
Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...
Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...
Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...
SOYEON KIM
 
Network embedding
Network embeddingNetwork embedding
Network embedding
SOYEON KIM
 
Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...
Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...
Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...
SOYEON KIM
 
Deep learning based multi-omics integration, a survey
Deep learning based multi-omics integration, a surveyDeep learning based multi-omics integration, a survey
Deep learning based multi-omics integration, a survey
SOYEON KIM
 
DeepWalk: Online Learning of Social Representations
DeepWalk: Online Learning of Social RepresentationsDeepWalk: Online Learning of Social Representations
DeepWalk: Online Learning of Social Representations
SOYEON KIM
 
Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering
Convolutional Neural Networks on Graphs with Fast Localized Spectral FilteringConvolutional Neural Networks on Graphs with Fast Localized Spectral Filtering
Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering
SOYEON KIM
 
Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search
Visual-Textual Joint Relevance Learning for Tag-Based Social Image SearchVisual-Textual Joint Relevance Learning for Tag-Based Social Image Search
Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search
SOYEON KIM
 
Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...
Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...
Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...
SOYEON KIM
 
A survey of heterogeneous information network analysis
A survey of heterogeneous information network analysisA survey of heterogeneous information network analysis
A survey of heterogeneous information network analysis
SOYEON KIM
 
Translated learning
Translated learningTranslated learning
Translated learning
SOYEON KIM
 
Self taught clustering
Self taught clusteringSelf taught clustering
Self taught clustering
SOYEON KIM
 
Semi-automatic ground truth generation using unsupervised clustering and limi...
Semi-automatic ground truth generation using unsupervised clustering and limi...Semi-automatic ground truth generation using unsupervised clustering and limi...
Semi-automatic ground truth generation using unsupervised clustering and limi...
SOYEON KIM
 
Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...
Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...
Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...
SOYEON KIM
 
Text extraction from natural scene image, a survey
Text extraction from natural scene image, a surveyText extraction from natural scene image, a survey
Text extraction from natural scene image, a survey
SOYEON KIM
 
Opinion Fraud Detection in Online Reviews by Network Effects
Opinion Fraud Detection in Online Reviews by Network EffectsOpinion Fraud Detection in Online Reviews by Network Effects
Opinion Fraud Detection in Online Reviews by Network Effects
SOYEON KIM
 
Evaluating color descriptors for object and scene recognition
Evaluating color descriptors for object and scene recognitionEvaluating color descriptors for object and scene recognition
Evaluating color descriptors for object and scene recognition
SOYEON KIM
 
Outcome-guided mutual information networks for investigating gene-gene intera...
Outcome-guided mutual information networks for investigating gene-gene intera...Outcome-guided mutual information networks for investigating gene-gene intera...
Outcome-guided mutual information networks for investigating gene-gene intera...
SOYEON KIM
 

More from SOYEON KIM (20)

Network-based machine learning approach for aggregating multi-modal data
Network-based machine learning approach for aggregating multi-modal dataNetwork-based machine learning approach for aggregating multi-modal data
Network-based machine learning approach for aggregating multi-modal data
 
Revealing disease-associated pathways by network integration of untargeted me...
Revealing disease-associated pathways by network integration of untargeted me...Revealing disease-associated pathways by network integration of untargeted me...
Revealing disease-associated pathways by network integration of untargeted me...
 
Systems genetics approaches to understand complex traits
Systems genetics approaches to understand complex traitsSystems genetics approaches to understand complex traits
Systems genetics approaches to understand complex traits
 
Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...
Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...
Robust Pathway-based Multi-Omics Data Integration using Directed Random Walk ...
 
Network embedding
Network embeddingNetwork embedding
Network embedding
 
Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...
Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...
Integrative Pathway-based Survival Prediction utilizing the Interaction betwe...
 
Deep learning based multi-omics integration, a survey
Deep learning based multi-omics integration, a surveyDeep learning based multi-omics integration, a survey
Deep learning based multi-omics integration, a survey
 
DeepWalk: Online Learning of Social Representations
DeepWalk: Online Learning of Social RepresentationsDeepWalk: Online Learning of Social Representations
DeepWalk: Online Learning of Social Representations
 
Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering
Convolutional Neural Networks on Graphs with Fast Localized Spectral FilteringConvolutional Neural Networks on Graphs with Fast Localized Spectral Filtering
Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering
 
Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search
Visual-Textual Joint Relevance Learning for Tag-Based Social Image SearchVisual-Textual Joint Relevance Learning for Tag-Based Social Image Search
Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search
 
Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...
Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...
Pathways-Driven Sparse Regression Identifies Pathways and Genes Associated wi...
 
A survey of heterogeneous information network analysis
A survey of heterogeneous information network analysisA survey of heterogeneous information network analysis
A survey of heterogeneous information network analysis
 
Translated learning
Translated learningTranslated learning
Translated learning
 
Self taught clustering
Self taught clusteringSelf taught clustering
Self taught clustering
 
Semi-automatic ground truth generation using unsupervised clustering and limi...
Semi-automatic ground truth generation using unsupervised clustering and limi...Semi-automatic ground truth generation using unsupervised clustering and limi...
Semi-automatic ground truth generation using unsupervised clustering and limi...
 
Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...
Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...
Mobile Phone Spam Image Detection based on Graph Partitioning with Pyramid H...
 
Text extraction from natural scene image, a survey
Text extraction from natural scene image, a surveyText extraction from natural scene image, a survey
Text extraction from natural scene image, a survey
 
Opinion Fraud Detection in Online Reviews by Network Effects
Opinion Fraud Detection in Online Reviews by Network EffectsOpinion Fraud Detection in Online Reviews by Network Effects
Opinion Fraud Detection in Online Reviews by Network Effects
 
Evaluating color descriptors for object and scene recognition
Evaluating color descriptors for object and scene recognitionEvaluating color descriptors for object and scene recognition
Evaluating color descriptors for object and scene recognition
 
Outcome-guided mutual information networks for investigating gene-gene intera...
Outcome-guided mutual information networks for investigating gene-gene intera...Outcome-guided mutual information networks for investigating gene-gene intera...
Outcome-guided mutual information networks for investigating gene-gene intera...
 

Recently uploaded

一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 

Recently uploaded (20)

一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 

Deep belief networks for spam filtering

  • 1.
  • 2. Motivation • Text mining + Network effect SMS corpus Spam score Content Analysis Network Analysis spam ham Spam Filtering System Many users’ data are needed
  • 3. Deep Belief Networks (DBNs) • What is a DBN (for classification)? – A feedforward neural network with a deep architecture - many hidden layers – Consists of : visible (input) units, hidden units, output units (for classification, one for each class) • Parameters of a DBN – W(j) :weights between the units of layers j-1 and j – b(j) : biases of layer j (no biases in the input layer).
  • 4. Training a DBN • Conventional approach: Gradient based optimization – Random initialization of weights and biases – Adjustment by backpropagation Optimization algorithms get stuck in poor solutions due to random initialization  Solution – Hinton et al [2006] proposed the use of a greedy layer- wise unsupervised algorithm for initialization of DBNs parameters – Initialization phase: initialize each layer by treating it as a Restricted Boltzmann Machine (RBM)
  • 5. Restricted Boltzmann Machines (RBMs) • An RBM is a two layer neural network – Binary inputs (visible units) are connected to binary outputs (hidden units) using symmetrically weighted connections • Parameters of an RBM – W :weights between the two layers – b, c :biases for visible and hidden layers respectively • Layer-to-layer conditional distributions Bidirectional Connections
  • 6. RBM Training • For every training example 1. Propagate it from visible to hidden units 2. Sample from the conditional 3. Propagate the sample in the opposite direction using ⇒ confabulation of the original data 4. Update the hidden units once more using the confabulation • Update the RBM parameters Data vector v Sample Sample Remember that RBM training is unsupervised Repeat
  • 7. DBN Training 1. Train the first layer RBM 2. Stack another hidden layer on top of the first RBM & train W(2) as a second RBM 3. Continue to stack layers on top of the network, and train it as previous step W(1) ,b(1) W(2) ,b(2) W(L) ,b(L) W(L+1) random Good initializations are obtained Fine tune the whole network by typical supervised criterion (mean square error, cross-entropy) -> they used conjugate gradients
  • 9. Performance Measures • Accuracy: percentage of correctly classified messages • Ham - Spam Recall: percentage of correctly classified ham – spam messages • Ham - Spam Precision: percentage of messages that are classified as ham – spam that are indeed ham - spam
  • 10. Experimental Setup • Message representation: x=[x1, x2, …, xm] – Each attribute(message) corresponds to a distinct word from the corpus – Use of frequency of the corresponding word • Attribute selection – Stop words and words appearing in <2 messages were removed + Information gain score (m=1500 for LingSpam, m=1000 for SpamAssassin and EnronSpam) • All experiments were performed using 10-fold cross validation
  • 11. Experimental Setup • SVM configuration – Cosine kernel (the usual trend in text classification) – The cost parameter C must be determined a priori – Tried many values for C – kept the best • DBN configuration – Use of a m-50-50-200-2 DBN architecture (3 hidden layers) – RBM training was performed using binary vectors for message representation (the presence or absence of a word in a message)
  • 13. Experimental Results  The DBN achieves higher accuracy on all datasets  Beats the SVM against all measures on SpamAssassin  The DBN proved robust to variations on the number of units of each layer DBN training is much slower compared to SVM training
  • 14. Conclusions • The effectiveness of the initialization method was demonstrated in practice • DBNs constitute a new viable solution to e- mail filtering • The selection of the DBN architecture needs to be addressed in a more systematic way – Number of layers – Number of units in each layer
  • 15. Challenges • One example of SpamAssassin dataset (email spam) Hi there, To be removed please visit: http://www.supersitescentral.com/rl/remove.html BIG News... Visit http://www.supersitescentral.com/rl/x601001.html for full details. We have discovered a secret to generating a fortune over the Internet and are looking for a few good people to share it with. This could finally be your chance to get that brand new car and go on that dream vacation you have always wanted. This is THE BIG ONE! So pay real close attention... Literally thousands of people are making obscene amounts of money from the Internet and ecommerce. We found an Internet giant who markets 11 million products with HUGE demand in every country around the globe. You can sit in the comfort of your home making money hand over fist with a HUGE global market at your fingertips. Most people never get the opportunity like this to join *BEFORE* the masses come in. Consider this: * Debt Free Multi-Million Dollar Company * International - in over 180 Countries * A 100 Billion Dollar Industry * 3 Year Proven Track Record * eCommerce Shopping Giant * Online Marketing Tools * Phenomenal Support Systems * Automated Recruiting Systems * Proprietary Back Office Technology * Huge Compensation Plan * Lifetime Residual income Go to the web site below to get all the details. http://www.supersitescentral.com/rl/x601001.html Isn't it your turn to make a fortune over the Internet? Don't drag your feet on this one. It could be the one you have been waiting for all your life. Talk to you soon, Mark iNet Marketing Services
  • 16. Challenges [Web발신] - N H. 금 융 - 더쉽고, 더안전하게 ~ 7.8 % 로 7000 사.용.하.실.수 있습니다 [Web발신] 크♥사[ㅏ리1.95 로♡ㅂㅔ당+0.05 스♥ㅂL셀1.65 OK♡레알1.49 추쳐닌ck77 time-pr콤 [Web발신] 사-용-중-인 체_크_카_드 빌-려-주-면 월-4-5-0 당-일-진-행 바_로_결_제 [Web발신] KB국민카드 김소 연님08/18KB국민 카드결제금액 3,500원.잔여포인 트리230(08/06기 준) <공학인 증>2014-1학기 미상담 시 성적확 인 및 수강신청 제약!! 학기 중 상 담 필수~!! • In case of Korean Spam SMS..? 1. See the distribution of words and special characters in spam and ham messages. 2. Input vector of DBN can be ‘number of special characters’ or ‘how correct the grammar of message is’ … instead of ‘number of spam words’
  • 17. Challenges • How to handle MMS Spam with image..? • Extract text from image • Image clustering • Input vector of DBN can be image vector