{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:39:11Z","timestamp":1763105951569,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,7,29]],"date-time":"2023-07-29T00:00:00Z","timestamp":1690588800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,29]],"date-time":"2023-07-29T00:00:00Z","timestamp":1690588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16327-4","type":"journal-article","created":{"date-parts":[[2023,7,29]],"date-time":"2023-07-29T02:01:37Z","timestamp":1690596097000},"page":"19897-19927","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Legitimate and spam SMS classification employing novel Ensemble feature selection algorithm"],"prefix":"10.1007","volume":"83","author":[{"given":"Shailender","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6545-8413","authenticated-orcid":false,"given":"Shweta","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,29]]},"reference":[{"key":"16327_CR1","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.engappai.2019.08.024","volume":"86","author":"O Abayomi-Alli","year":"2019","unstructured":"Abayomi-Alli O, Misra S, Abayomi-Alli A, Odusami M (2019) A review of soft techniques for SMS spam classification: methods, approaches and applications. Eng Appl Artif Intell 86:197\u2013212","journal-title":"Eng Appl Artif Intell"},{"issue":"4","key":"16327_CR2","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.1007\/s11042-017-5018-x","volume":"78","author":"KS Adewole","year":"2019","unstructured":"Adewole KS, Anuar NB, Kamsin A, Sangaiah AK (2019) SMSAD: a framework for spam message and spam account detection. Multimed Tools Appl 78(4):3925\u20133960","journal-title":"Multimed Tools Appl"},{"key":"16327_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal K, Kumar T (2018) E-mail spam detection using integrated approach of Na\u00efve Bayes and particle swarm optimization. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, pp 685\u2013690","DOI":"10.1109\/ICCONS.2018.8662957"},{"issue":"8","key":"16327_CR4","doi-asserted-by":"publisher","first-page":"11583","DOI":"10.1007\/s11042-020-10405-7","volume":"80","author":"SBS Ahmad","year":"2021","unstructured":"Ahmad SBS, Rafie M, Ghorabie SM (2021) Spam detection on Twitter using a support vector machine and users\u2019 features by identifying their interactions. Multimed Tools Appl 80(8):11583\u201311605","journal-title":"Multimed Tools Appl"},{"key":"16327_CR5","doi-asserted-by":"crossref","unstructured":"Almeida TA, Hidalgo JMG, Yamakami A (2011) Contributions to the study of SMS spam filtering: new collection and results. In: Proceedings of the 11th ACM symposium on document engineering, pp 259\u2013262","DOI":"10.1145\/2034691.2034742"},{"key":"16327_CR6","doi-asserted-by":"publisher","first-page":"125076","DOI":"10.1109\/ACCESS.2020.3007291","volume":"8","author":"Q Al-Tashi","year":"2020","unstructured":"Al-Tashi Q, Abdulkadir SJ, Rais HM, Mirjalili S, Alhussian H (2020) Approaches to multi-objective feature selection: a systematic literature review. IEEE Access 8:125076\u2013125096","journal-title":"IEEE Access"},{"key":"16327_CR7","doi-asserted-by":"crossref","unstructured":"Baaqeel H, Zagrouba R (2020) Hybrid SMS spam filtering system using machine learning techniques. In: 2020 21st International Arab Conference on Information Technology (ACIT). IEEE, pp 1\u20138","DOI":"10.1109\/ACIT50332.2020.9300071"},{"issue":"12","key":"16327_CR8","doi-asserted-by":"publisher","first-page":"18107","DOI":"10.1007\/s11042-021-10602-y","volume":"80","author":"P Bhuvaneshwari","year":"2021","unstructured":"Bhuvaneshwari P, Rao AN, Robinson YH (2021) Spam review detection using self attention based CNN and bi-directional LSTM. Multimed Tools Appl 80(12):18107\u201318124","journal-title":"Multimed Tools Appl"},{"key":"16327_CR9","doi-asserted-by":"crossref","unstructured":"Bosaeed S, Katib I, Mehmood R (2020) A fog-augmented machine learning based SMS spam detection and classification system. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, pp 325\u2013330","DOI":"10.1109\/FMEC49853.2020.9144833"},{"key":"16327_CR10","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, pp 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"issue":"1\u20134","key":"16327_CR11","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3233\/IDA-1997-1302","volume":"1","author":"M Dash","year":"1997","unstructured":"Dash M, Liu H (1997) Feature selection for classification. Intell Data Anal 1(1\u20134):131\u2013156","journal-title":"Intell Data Anal"},{"issue":"45","key":"16327_CR12","first-page":"1","volume":"17","author":"\u00dc Dogan","year":"2016","unstructured":"Dogan \u00dc, Glasmachers T, Igel C (2016) A unified view on multi-class support vector classification. J Mach Learn Res 17(45):1\u201332","journal-title":"J Mach Learn Res"},{"key":"16327_CR13","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.future.2016.02.018","volume":"64","author":"ESM El-Alfy","year":"2016","unstructured":"El-Alfy ESM, AlHasan AA (2016) Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm. Futur Gener Comput Syst 64:98\u2013107","journal-title":"Futur Gener Comput Syst"},{"key":"16327_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8873639","volume":"2020","author":"L GuangJun","year":"2020","unstructured":"GuangJun L, Nazir S, Khan HU, Haq AU (2020) Spam detection approach for secure mobile message communication using machine learning algorithms. Security and Communication Networks 2020:1\u20136","journal-title":"Security and Communication Networks"},{"issue":"8","key":"16327_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735","journal-title":"Neural Comput"},{"key":"16327_CR16","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN'95-international conference on neural networks, vol 4. IEEE, pp 1942\u20131948","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"3","key":"16327_CR17","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1504\/IJBIC.2017.083677","volume":"9","author":"T Kumaresan","year":"2017","unstructured":"Kumaresan T, Palanisamy C (2017) E-mail spam classification using S-cuckoo search and support vector machine. Int J Bio-Inspired Comput 9(3):142\u2013156","journal-title":"Int J Bio-Inspired Comput"},{"issue":"6","key":"16327_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3136625","volume":"50","author":"J Li","year":"2017","unstructured":"Li J, Cheng K, Wang S, Morstatter F, Trevino RP, Tang J, Liu H (2017) Feature selection: a data perspective. ACM Computing Surveys (CSUR) 50(6):1\u201345","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"16327_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.future.2021.06.026","volume":"125","author":"A Makkar","year":"2021","unstructured":"Makkar A, Kumar N (2021) PROTECTOR: an optimized deep learning-based framework for image spam detection and prevention. Futur Gener Comput Syst 125:41\u201358","journal-title":"Futur Gener Comput Syst"},{"key":"16327_CR20","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983433","volume-title":"Applied logistic regression analysis","author":"S Menard","year":"2002","unstructured":"Menard S (2002) Applied logistic regression analysis, vol 106. Sage, New York"},{"issue":"21","key":"16327_CR21","doi-asserted-by":"publisher","first-page":"433","DOI":"10.21105\/joss.00433","volume":"3","author":"LJ Miranda","year":"2018","unstructured":"Miranda LJ (2018) PySwarms: a research toolkit for particle swarm optimization in python. J Open Source Softw 3(21):433","journal-title":"J Open Source Softw"},{"key":"16327_CR22","unstructured":"Mustapha IB, Hasan S, Olatunji SO, Shamsuddin SM, Kazeem A (2020) Effective E-mail spam detection system using extreme gradient boosting. arXiv preprint  arXiv:2012.14430"},{"key":"16327_CR23","unstructured":"Poonkodi, T., & Sukumaran, S. (2021). Effective Adaboost Sequential Classification Algorithm based Ensemble Method for E-Mail Spam Filtering. Annals of the Romanian Society for Cell Biology, 13056\u201313066"},{"issue":"6\u20137","key":"16327_CR24","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1080\/01969722.2013.805110","volume":"44","author":"M Prilepok","year":"2013","unstructured":"Prilepok M, Berek P, Platos J, Snasel V (2013) Spam detection using data compression and signatures. Cybern Syst 44(6\u20137):533\u2013549","journal-title":"Cybern Syst"},{"issue":"9","key":"16327_CR25","first-page":"426","volume":"12","author":"GSN Rao","year":"2021","unstructured":"Rao GSN (2021) Spam or ham text classification using logistic regression. Turk J Comput Math Educ 12(9):426\u2013433","journal-title":"Turk J Comput Math Educ"},{"key":"16327_CR26","unstructured":"Renuka KD, Visalakshi P (2014) Latent semantic indexing based SVM model for email spam classification"},{"key":"16327_CR27","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.future.2019.09.001","volume":"102","author":"PK Roy","year":"2020","unstructured":"Roy PK, Singh JP, Banerjee S (2020) Deep learning to filter SMS Spam. Futur Gener Comput Syst 102:524\u2013533","journal-title":"Futur Gener Comput Syst"},{"key":"16327_CR28","doi-asserted-by":"crossref","unstructured":"Shehu HA, Browne W, Eisenbarth H (2021) Particle swarm optimization for feature selection in emotion categorization. In: 2021 IEEE Congress on Evolutionary Computation (CEC). IEEE, pp 752\u2013759","DOI":"10.1109\/CEC45853.2021.9504986"},{"key":"16327_CR29","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.procs.2019.11.150","volume":"161","author":"NNA Sjarif","year":"2019","unstructured":"Sjarif NNA, Azmi NFM, Chuprat S, Sarkan HM, Yahya Y, Sam SM (2019) SMS spam message detection using term frequency-inverse document frequency and random forest algorithm. Procedia Comput Sci 161:509\u2013515","journal-title":"Procedia Comput Sci"},{"key":"16327_CR30","doi-asserted-by":"crossref","unstructured":"Sjarif NNA, YazriwatiYahya S, Azmi NHFM (2020) Support vector machine algorithm for SMS spam classification in the telecommunication industry. Int J Adv Sci Eng Inf Technol 10(2)","DOI":"10.18517\/ijaseit.10.2.10175"},{"issue":"1","key":"16327_CR31","first-page":"11","volume":"13","author":"ZS Torabi","year":"2015","unstructured":"Torabi ZS, Nadimi-Shahraki MH, Nabiollahi A (2015) Efficient support vector machines for spam detection: a survey. International Journal of Computer Science and Information Security 13(1):11","journal-title":"Int J Comput Sci Inf Secur"},{"issue":"8","key":"16327_CR32","doi-asserted-by":"publisher","first-page":"3494","DOI":"10.1016\/j.asoc.2013.03.021","volume":"13","author":"SM Vieira","year":"2013","unstructured":"Vieira SM, Mendon\u00e7a LF, Farinha GJ, Sousa JM (2013) Modified binary PSO for feature selection using SVM applied to mortality prediction of septic patients. Applied Soft Computing 13(8):3494\u20133504","journal-title":"Applied Soft Computing"},{"issue":"2","key":"16327_CR33","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s00500-016-2474-6","volume":"22","author":"D Wang","year":"2018","unstructured":"Wang D, Tan D, Liu L (2018) Particle swarm optimization algorithm: an overview. Soft Comput 22(2):387\u2013408","journal-title":"Soft Comput"},{"issue":"14","key":"16327_CR34","doi-asserted-by":"publisher","first-page":"5011","DOI":"10.3390\/app10145011","volume":"10","author":"T Xia","year":"2020","unstructured":"Xia T, Chen X (2020) A discrete hidden Markov model for SMS spam detection. Appl Sci 10(14):5011","journal-title":"Appl Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16327-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16327-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16327-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T10:24:39Z","timestamp":1707992679000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16327-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,29]]},"references-count":34,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["16327"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16327-4","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,7,29]]},"assertion":[{"value":"7 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we do not have any conflict of interest in the publication of this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}