[1]
Denning P J. Electronic junk [J], Communications of the ACM, 1992, 25(3): 163-165. Malone T, Grant K, Turbak F, et al. Intelligent information sharing systems [J]. Communications of the ACM, 1987, 5: 390-402.
DOI: 10.1145/22899.22903
Google Scholar
[2]
Christopher D H. Internet Filter Effectiveness: Testing Over and under inclusive Blocking Decisions of Four Popular Filters[C]. Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, 2000: 287-294.
DOI: 10.1145/332186.332302
Google Scholar
[3]
Lee P Y, Hui S C, and Fong A C M. Neural Networks for Web Content Filtering [J]. IEEE Intelligent Systems, 2002: 48-57.
DOI: 10.1109/mis.2002.1039832
Google Scholar
[4]
Lee J S, Jeon Y H. A Study on the Effective Selective Filtering Technology of Harmful Website Using Internet Content Rating Service [J]. Communication of KIPS Review, 2002, 9(2).
Google Scholar
[5]
Caulkins J P, Ding W, Duncan G, et al. A method for managing access to web pages: Filtering by statistical classification applied to text [J]. Decision Support Systems, 2006(42): 144–161.
DOI: 10.1016/j.dss.2004.11.015
Google Scholar
[6]
Lee Z S, Maarof M A, Selamat A, et al. Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content Classification[C]. Eighth International Conference on Intelligent Systems Design and Applications, 2008, 145-150.
DOI: 10.1109/isda.2008.171
Google Scholar
[7]
Lee P Y, Hui S C, Fong A C M. An Intelligent Categorization Engine for Billingual Web Content Filtering [J]. IEEE transactions on multimedia, 2005, 7(6): 1183-1190.
DOI: 10.1109/tmm.2005.858414
Google Scholar
[8]
Hu Wei-ming, Wu Qu, Chen Zhou-yao, et al. Recognition of pornographic web pages by classifying texts and images[J]. IEEE transactions on pattern analysis and machine intelligence, 2007, 29(6): 1019–1034.
DOI: 10.1109/tpami.2007.1133
Google Scholar
[9]
Lee W, Lee S S, Chung S, et al. An Harmful Contents Classification Using the Harmful Word Filtering and SVM[C]. ICCS 2007, Part III, LNCS 4489: 18-27.
DOI: 10.1007/978-3-540-72588-6_3
Google Scholar
[10]
Wu Qu, Hu Wei-ming. Web Sensitive Text Filtering by Combing Semantics and Statistics[C]. Proceeding of NLP-KE'05, 2005: 663-667.
Google Scholar
[11]
Kim Y, Nam T. An Efficient Text Filter for Adult Web Documents[C]. ICACT2006, 2006(2): 438-440.
Google Scholar
[12]
Peng Yuzhong, Yuan Chang-an, Wang Yan. Studies on objectionable information filtering technology based on contents understanding. [J]. Application Research of computers. 2009, 26(2): 433-438.
Google Scholar
[13]
Li Qiang, Li Jianhua. Filter of unhealthy text based on SVM [J] Computer Engineering, 2006, 32(10): 4-5.
Google Scholar
[14]
Liu Yongdan, Zeng Haiquan, Li Ronglu. Polarity text filtering based on semantic analysis [J]. Journal of China Institute of Communications, 2004, 25(7): 78-85.
Google Scholar
[15]
Cheng Xian-yi, Yang Tianming, Zhu Qian. Research of text filtering based on semantic orientation [J]. Application Research of computers, 2009, 26(12): 4460-4462.
Google Scholar
[16]
Gao Qingshi, Li Li, Liu HongLan. Key word filter method based on pruning on the tree representations of semantic elements [J]. Journal of university of science and technology Beijing, 2006, 28(12): 1191-1195.
Google Scholar
[17]
Li Cun, Qiao Baojun, Cao Yuan-da. Word Orientation Recognition Based on Semantic Analysis [J]. Pattern Recognition and Artificial intelligence, 2008, 21(4): 482-487.
Google Scholar
[18]
Fan Xinghua, Sun Maosong. A High Performance Two-Class Chinese Text Categorization Method [J]. Chinese journal of Computers, 2006, 29(1): 124-131.
Google Scholar
[19]
Zhu ZhenFang, Liu Pei-yu, Zhang Hongjun. Network information filtering model based on annealing genetic algorithm [J]. Computer engineering and design, 2009, 30(2): 419-422.
Google Scholar
[20]
Huang Huiyu, Li Congdong, Ren Jiadong. Real Time Monitoring Prototype System for Bad Information Based on Artificial Neural Networks [J]. Computer Engineering, 2006, 32(2): 254-256.
Google Scholar
[21]
Liu He, Liu Da-you, Fei Zhi-de, Gao Yin. A Feature Weighting Scheme for Text Categorization Based on Feature Importance. Journal of Computer Research and Development, 2009, 46(10): 1693-1703.
Google Scholar
[22]
Xueguang Zhou, Huanguo Zhang, A Dynamic Data Mining Algorithm Based on Chinese Characteristics [J], J. of Computational Information Systems. 3(3): 859-866, (2007).
Google Scholar
[23]
Xueguang Zhou, Huanguo Zhang, A Cascade Mining Algorithm Based on Chinese Keywords Web Mining[C], Proc. of The 7th World Congress on Intelligent Control and Automation, Chongqing, China: 4080-4084, June, (2008).
DOI: 10.1109/wcica.2008.4593577
Google Scholar
[24]
Zhou Xueguang, Zhang Huanguo. Flexible Pattern Matching Algorithm in Chinese Strings[C], Proceedings of the 27th Chinese Control Conference, Kumming, China, vol. 5: 610-614, July (2008).
DOI: 10.1109/chicc.2008.4604947
Google Scholar
[25]
Sun Yan, Zhou Xueguang, A character recognition algorithm for unhealthy-text embedded in web images[C], Proceedings of the 14th Youth Conference on Communication, YCC2009: 453-458, Dalian, China, July24-26, 2009, Scientific Research Publishing Press.
Google Scholar
[26]
Zhou Xueguang, Zhang Huanguo. Flexible Pattern Matching Algorithm for Anti-Active Jamming in Chinese String [J] J. Wuhan University (Nat. Sci. Ed. ), 2009, 55(1): 101-104.
DOI: 10.1109/chicc.2008.4604947
Google Scholar
[27]
Shuai Zhenghua, Zhou Xueguang. Feature Extraction Method in Chinese Text Based on Flexible Matching [J], Computer Engineering, 2010, 36(16): 63-64.
Google Scholar
[28]
Ma Fang, Zhou Xueguang, Chen Tao, Networking jamming equation based on super-logical countermeasures, 2010 International Conference on Information Security and Artificial Intelligence(ISAI2010), Vol. 1: 14-18, Dec 17-19, 2010, Chengdu, China, IEEE Computer Society Press.
Google Scholar