0% Complete
Home
/
13th International Conference on Computer and Knowledge Engineering
A Comprehensive Approach to SMS Spam Filtering Integrating Embedded and Statistical Features
Authors :
Shaghayegh Hosseinpour
1
Mohammad Reza Keyvanpour
2
1- Data Mining Laboratory, Department of Computer Engineering, Faculty of Engineering, Alzahra University Tehran, Iran
2- Department of Computer Engineering, Faculty of Engineering, Alzahra University Tehran, Iran
Keywords :
SMS spam،Spam filtering،Text classification،Word embedding،TF-IDF،CNN
Abstract :
Modern society relies heavily on mobile phones to communicate. One of the most valuable mobile phone services is SMS (Short Message Service), which simplifies communication greatly. There have been spammers who have misused this platform by sending inappropriate messages to users, provoking them and costing them money. Due to imbalanced data, unclear semantics, and the inability to extract sufficient features from short messages, SMS spam can be difficult to filter. While spam messages have been filtered so far using various methods, their accuracy is still a work in progress. This study uses embeddings and TF-IDF to provide more information from short text messages while improving SMS spam filtering accuracy. The proposed approach was tested on a real dataset. Experiments analyzing evaluation parameters demonstrate that this model is effective.
Papers List
List of archived papers
Improving the classification of high dimensional class-imbalanced data using the Chaos particle swarm optimization with Levy Flight
Mohammad Ali Zarif - Javad Hamidzadeh
Leveraging a structure-based and learning-based predictor using various feature groups in bioinformatics (case study: protein-peptide region residue-level interaction)
Shima Shafiee - Abdolhossein Fathi
EEMC: Energy Efficient Multi-Clustering Using Grey Wolf Optimizer in WSNs
Maryam Ghorbanvirdi - Sayyed Majid Mazinani
Non-Negative Matrix Factorization improves Residual Neural Networks
Hojjat Moayed
An effective hybrid algorithm for locating splicing forgery image
Seyed Hesamoddin Hosseini - Amene Vatanparast - Amir Hossein Taherinia
Analysis of Insect-plant Interactions Affected by Mining operations, A Graph Mining Approach
Mohammad Heydari - Ali Bayat - Amir Albadvi
Towards Efficient Capsule Networks through Approximate Squash Function and Layer-wise Quantization
Mohsen Raji - Kimia Soroush - Amir Ghazizadeh
An optimal workflow scheduling method in cloud-fog computing using three-objective Harris-Hawks algorithm
Ahmadreza Montazerolghaem - Maryam Khosravi - Fatemeh Rezaee
A Review on Machine Learning Methods for Workload Prediction in Cloud Computing
Mohammad Yekta - Hadi Shahriar Shahhoseini
LPCNet: Lane detection by lane points correction network in challenging environments based on deep learning
Sina BaniasadAzad - Seyed Mohammadreza Mousavi mirkolaei
more
Samin Hamayesh - Version 42.4.1