{"id":"https://openalex.org/W1983915931","doi":"https://doi.org/10.1109/iwcmc.2012.6314350","title":"Graph-based learning model for detection of SMS spam on smart phones","display_name":"Graph-based learning model for detection of SMS spam on smart phones","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W1983915931","doi":"https://doi.org/10.1109/iwcmc.2012.6314350","mag":"1983915931"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2012.6314350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2012.6314350","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lirias.kuleuven.be/handle/123456789/538614","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103516581","display_name":"M. Zubair Rafique","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Muhammad Zubair Rafique","raw_affiliation_strings":["Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","Center of Excellence in Information Assurance, King Saud University, Riyadh, Kingdom of Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Kingdom of Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079913042","display_name":"Muhammad Abulaish","orcid":"https://orcid.org/0000-0003-3387-4743"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Abulaish","raw_affiliation_strings":["Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","Center of Excellence in Information Assurance, King Saud University, Riyadh, Kingdom of Saudi Arabia#TAB#"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Kingdom of Saudi Arabia#TAB#","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103516581"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":null,"apc_paid":null,"fwci":2.1316,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.89693213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1046","last_page":"1051"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8349642753601074},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5511153340339661},{"id":"https://openalex.org/keywords/short-message-service","display_name":"Short Message Service","score":0.46141916513442993},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.434776246547699},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4065425992012024},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35301533341407776},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1582409143447876},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.13038313388824463}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8349642753601074},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5511153340339661},{"id":"https://openalex.org/C74558129","wikidata":"https://www.wikidata.org/wiki/Q43024","display_name":"Short Message Service","level":2,"score":0.46141916513442993},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.434776246547699},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4065425992012024},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35301533341407776},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1582409143447876},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.13038313388824463}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc.2012.6314350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2012.6314350","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/538614","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/538614","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"8th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol: CYPRUS, 27-31 August 2012","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/538614","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/538614","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"8th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol: CYPRUS, 27-31 August 2012","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2000369940","https://openalex.org/W2062614982","https://openalex.org/W2081591787","https://openalex.org/W2091362531","https://openalex.org/W2097381646","https://openalex.org/W2163931946","https://openalex.org/W6666065773"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"Short":[0],"Message":[1],"Service":[2],"(SMS)":[3],"has":[4],"been":[5],"increasingly":[6],"exploited":[7],"through":[8,53],"spam":[9,27,68,98],"propagation":[10],"schemes":[11],"in":[12,70],"recent":[13],"years.":[14],"This":[15],"paper":[16],"presents":[17],"a":[18,49],"new":[19],"method":[20,86],"for":[21],"graph-based":[22],"learning":[23],"and":[24,32,43,107,119],"classification":[25],"of":[26,45,58],"SMS":[28,46],"on":[29,39,78,115],"mobile":[30,117],"devices":[31,118],"smart":[33,120],"phones.":[34,121],"Our":[35],"approach":[36,102],"is":[37],"based":[38],"modeling":[40],"the":[41],"content":[42],"patterns":[44],"syntax":[47],"into":[48],"direct":[50],"ed-weighted":[51],"graph":[52,61],"exploiting":[54],"modern":[55],"composition":[56],"style":[57],"messages.":[59,99],"The":[60],"attributes":[62],"are":[63],"then":[64],"used":[65],"to":[66,96,113],"classify":[67],"messages":[69],"real-time":[71],"by":[72],"using":[73],"KL-Divergence":[74],"measure.":[75],"Experimental":[76],"results":[77],"two":[79],"real-world":[80],"datasets":[81],"show":[82],"that":[83],"our":[84,101],"proposed":[85],"achieves":[87],"high":[88],"detection":[89],"accuracy":[90],"with":[91],"less":[92,105],"false":[93],"alarm":[94],"rate":[95],"detect":[97],"Moreover,":[100],"requires":[103],"relatively":[104],"memory":[106],"processing":[108],"power,":[109],"making":[110],"it":[111],"suitable":[112],"deploy":[114],"resource-constrained":[116]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
