{"id":"https://openalex.org/W4386880507","doi":"https://doi.org/10.1155/2023/6648970","title":"An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection","display_name":"An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection","publication_year":2023,"publication_date":"2023-09-20","ids":{"openalex":"https://openalex.org/W4386880507","doi":"https://doi.org/10.1155/2023/6648970"},"language":"en","primary_location":{"id":"doi:10.1155/2023/6648970","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/6648970","pdf_url":"https://downloads.hindawi.com/journals/acisc/2023/6648970.pdf","source":{"id":"https://openalex.org/S30680879","display_name":"Applied Computational Intelligence and Soft Computing","issn_l":"1687-9724","issn":["1687-9724","1687-9732"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computational Intelligence and Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/acisc/2023/6648970.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092906799","display_name":"Umair Maqsood","orcid":null},"institutions":[{"id":"https://openalex.org/I200749728","display_name":"Pir Mehr Ali Shah Arid Agriculture University","ror":"https://ror.org/035zn2q74","country_code":"PK","type":"education","lineage":["https://openalex.org/I200749728"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Umair Maqsood","raw_affiliation_strings":["University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan","institution_ids":["https://openalex.org/I200749728"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059289090","display_name":"Saif Ur Rehman","orcid":"https://orcid.org/0000-0002-5810-6479"},"institutions":[{"id":"https://openalex.org/I200749728","display_name":"Pir Mehr Ali Shah Arid Agriculture University","ror":"https://ror.org/035zn2q74","country_code":"PK","type":"education","lineage":["https://openalex.org/I200749728"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Saif Ur Rehman","raw_affiliation_strings":["University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-5810-6479","affiliations":[{"raw_affiliation_string":"University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan","institution_ids":["https://openalex.org/I200749728"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102907763","display_name":"Tariq Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I200749728","display_name":"Pir Mehr Ali Shah Arid Agriculture University","ror":"https://ror.org/035zn2q74","country_code":"PK","type":"education","lineage":["https://openalex.org/I200749728"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Tariq Ali","raw_affiliation_strings":["University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan","institution_ids":["https://openalex.org/I200749728"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017798048","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-6067-382X"},"institutions":[{"id":"https://openalex.org/I172324550","display_name":"Gomal University","ror":"https://ror.org/0241b8f19","country_code":"PK","type":"education","lineage":["https://openalex.org/I172324550"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Institute of Computing and Information Technology, Gomal University, D.I. Khan, KP, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-6067-382X","affiliations":[{"raw_affiliation_string":"Institute of Computing and Information Technology, Gomal University, D.I. Khan, KP, Pakistan","institution_ids":["https://openalex.org/I172324550"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079436458","display_name":"Tahani Alsaedi","orcid":null},"institutions":[{"id":"https://openalex.org/I23075662","display_name":"Taibah University","ror":"https://ror.org/01xv1nn60","country_code":"SA","type":"education","lineage":["https://openalex.org/I23075662"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Tahani Alsaedi","raw_affiliation_strings":["Applied College, Taibah University, Madina 42353, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Applied College, Taibah University, Madina 42353, Saudi Arabia","institution_ids":["https://openalex.org/I23075662"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072598308","display_name":"Mahwish Kundi","orcid":"https://orcid.org/0000-0001-8043-3030"},"institutions":[{"id":"https://openalex.org/I153648349","display_name":"University of Leicester","ror":"https://ror.org/04h699437","country_code":"GB","type":"education","lineage":["https://openalex.org/I153648349"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mahwish Kundi","raw_affiliation_strings":["University of Leicester, Leicester, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Leicester, Leicester, UK","institution_ids":["https://openalex.org/I153648349"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5059289090"],"corresponding_institution_ids":["https://openalex.org/I200749728"],"apc_list":{"value":900,"currency":"USD","value_usd":900},"apc_paid":{"value":900,"currency":"USD","value_usd":900},"fwci":9.7742,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.98073401,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"2023","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8831064701080322},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7290445566177368},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7092465162277222},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.600777268409729},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5525140166282654},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5519720911979675},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5477109551429749},{"id":"https://openalex.org/keywords/short-message-service","display_name":"Short Message Service","score":0.5065666437149048},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4660673439502716},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4217660129070282},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3140626847743988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30303019285202026},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2661406099796295},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12302231788635254}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8831064701080322},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7290445566177368},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7092465162277222},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.600777268409729},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5525140166282654},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5519720911979675},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5477109551429749},{"id":"https://openalex.org/C74558129","wikidata":"https://www.wikidata.org/wiki/Q43024","display_name":"Short Message Service","level":2,"score":0.5065666437149048},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4660673439502716},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4217660129070282},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3140626847743988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30303019285202026},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2661406099796295},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12302231788635254},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2023/6648970","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/6648970","pdf_url":"https://downloads.hindawi.com/journals/acisc/2023/6648970.pdf","source":{"id":"https://openalex.org/S30680879","display_name":"Applied Computational Intelligence and Soft Computing","issn_l":"1687-9724","issn":["1687-9724","1687-9732"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computational Intelligence and Soft Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:eb43b3bf844447c9a4bc339b0594ce25","is_oa":true,"landing_page_url":"https://doaj.org/article/eb43b3bf844447c9a4bc339b0594ce25","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Applied Computational Intelligence and Soft Computing, Vol 2023 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2023/6648970","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2023/6648970","pdf_url":"https://downloads.hindawi.com/journals/acisc/2023/6648970.pdf","source":{"id":"https://openalex.org/S30680879","display_name":"Applied Computational Intelligence and Soft Computing","issn_l":"1687-9724","issn":["1687-9724","1687-9732"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Applied Computational Intelligence and Soft Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4386880507.pdf"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1141949320","https://openalex.org/W1968955064","https://openalex.org/W1983838073","https://openalex.org/W1996262124","https://openalex.org/W2009729849","https://openalex.org/W2030711406","https://openalex.org/W2036166268","https://openalex.org/W2074339481","https://openalex.org/W2113922297","https://openalex.org/W2120011452","https://openalex.org/W2136828682","https://openalex.org/W2171602566","https://openalex.org/W2185177373","https://openalex.org/W2338083885","https://openalex.org/W2345375561","https://openalex.org/W2471881951","https://openalex.org/W2483572929","https://openalex.org/W2567149662","https://openalex.org/W2571819921","https://openalex.org/W2576815293","https://openalex.org/W2591945600","https://openalex.org/W2609225916","https://openalex.org/W2724222212","https://openalex.org/W2753189782","https://openalex.org/W2754695216","https://openalex.org/W2771340047","https://openalex.org/W2783922631","https://openalex.org/W2797652130","https://openalex.org/W2801332331","https://openalex.org/W2801802177","https://openalex.org/W2886073571","https://openalex.org/W2888021909","https://openalex.org/W2901292257","https://openalex.org/W2917544878","https://openalex.org/W2921477761","https://openalex.org/W2962707464","https://openalex.org/W2962777114","https://openalex.org/W2971852873","https://openalex.org/W2996930874","https://openalex.org/W3011823135","https://openalex.org/W3025488764","https://openalex.org/W3044192484","https://openalex.org/W3082362580","https://openalex.org/W3088451060","https://openalex.org/W3170569526","https://openalex.org/W4295837454","https://openalex.org/W4313324655","https://openalex.org/W4313640622","https://openalex.org/W4318262241","https://openalex.org/W4321600494"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W3042334625","https://openalex.org/W3139248031","https://openalex.org/W4200017362","https://openalex.org/W2305322260","https://openalex.org/W2118123121","https://openalex.org/W4388020458"],"abstract_inverted_index":{"The":[0,47],"use":[1],"of":[2,18,26,99,131,136],"short":[3],"message":[4],"service":[5],"(SMS)":[6],"and":[7,40,86,95,133,145,170],"e-mail":[8,146],"have":[9],"increased":[10],"too":[11],"much":[12],"over":[13],"the":[14,143,158,161,165,178,193],"last":[15],"decades.":[16],"80%":[17],"people":[19],"do":[20],"not":[21],"read":[22,31],"e-mails":[23,48,67],"while":[24],"98%":[25],"cell":[27],"phone":[28],"users":[29,71],"daily":[30],"their":[32,77],"SMS.":[33],"However,":[34],"these":[35,93],"communication":[36],"media":[37],"are":[38,63,88],"unsafe":[39],"can":[41],"produce":[42],"malicious":[43,74],"attacks":[44],"called":[45],"spam.":[46],"that":[49,164,190],"pretend":[50],"to":[51,57,90,142],"be":[52],"from":[53],"a":[54,114,134],"trusted":[55],"company":[56],"provide":[58],"\u201cfinancial":[59],"or":[60],"personal":[61],"information\u201d":[62],"phishing":[64],"e-mails.":[65],"These":[66,187],"contain":[68],"some":[69],"links;":[70],"might":[72],"download":[73],"software":[75],"on":[76,82,157],"computers":[78],"when":[79],"they":[80],"click":[81],"them.":[83],"Most":[84],"techniques":[85],"models":[87],"developed":[89],"automatically":[91],"detect":[92],"\u201cSMS":[94],"e-mails\u201d":[96],"but":[97],"none":[98],"them":[100],"achieved":[101],"100%":[102],"accuracy.":[103,121,153],"In":[104],"previous":[105],"studies":[106],"using":[107,113],"machine":[108,181],"learning":[109,138],"(ML),":[110],"spam":[111,149],"detection":[112,150],"small":[115],"dataset":[116,147],"has":[117],"resulted":[118],"in":[119,126],"lower":[120],"To":[122],"counter":[123],"this":[124,127],"problem,":[125],"paper,":[128],"multiple":[129],"classifiers":[130],"ML":[132],"classifier":[135,183],"deep":[137],"(DL)":[139],"were":[140],"applied":[141],"SMS":[144],"for":[148,196],"with":[151],"higher":[152],"After":[154],"conducting":[155],"experiments":[156],"real":[159],"dataset,":[160],"researchers":[162],"concluded":[163],"proposed":[166],"system":[167],"performed":[168],"better":[169],"more":[171],"accurately":[172],"than":[173],"previously":[174],"existing":[175],"models.":[176],"Specifically,":[177],"support":[179],"vector":[180],"(SVM)":[182],"outperformed":[184],"all":[185],"others.":[186],"results":[188],"suggest":[189],"SVM":[191],"is":[192],"optimal":[194],"choice":[195],"classification":[197],"purposes.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
