{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T03:53:45Z","timestamp":1771646025748,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508109","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"244-251","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection"],"prefix":"10.1145","author":[{"given":"Rubaiath E","family":"Ulfath","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Chittagong University of Engineering &amp; Technology, Bangladesh"}]},{"given":"Hamed","family":"Alqahtani","sequence":"additional","affiliation":[{"name":"King Khalid University, Saudi Arabia"}]},{"given":"Mohammad","family":"Hammoudeh","sequence":"additional","affiliation":[{"name":"Department of Computing &amp; Math, Manchester Metropolitan University, United Kingdom"}]},{"given":"Iqbal H.","family":"Sarker","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chittagong University of Engineering &amp; Technology, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011. Text Message Spam Infographic. https:\/\/www.tatango.com\/blog\/text-message-spam-infographic\/  2011. Text Message Spam Infographic. https:\/\/www.tatango.com\/blog\/text-message-spam-infographic\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2012. UCI Machine Learning Repository: SMS Spam Collection Data Set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/sms+spam+collection  2012. UCI Machine Learning Repository: SMS Spam Collection Data Set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/sms+spam+collection"},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Daily SMS Mobile Usage Statistics. https:\/\/www.smseagle.eu\/2017\/03\/06\/daily-sms-mobile-statistics\/  2017. Daily SMS Mobile Usage Statistics. https:\/\/www.smseagle.eu\/2017\/03\/06\/daily-sms-mobile-statistics\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Mobile Phishing Increases More Than 300% as 2020 Chaos Continues | Proofpoint US. https:\/\/www.proofpoint.com\/us\/blog\/threat-protection\/mobile-phishing-increases-more-300-2020-chaos-continues  2021. Mobile Phishing Increases More Than 300% as 2020 Chaos Continues | Proofpoint US. https:\/\/www.proofpoint.com\/us\/blog\/threat-protection\/mobile-phishing-increases-more-300-2020-chaos-continues"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC49853.2020.9144833"},{"key":"e_1_3_2_1_7_1","volume-title":"Machine Learning Detection for SMiShing Frauds. In 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC). 1\u20132. https:\/\/doi.org\/10","author":"Boukari Badr\u00a0Eddine","year":"2021","unstructured":"Badr\u00a0Eddine Boukari , Akshaya Ravi , and Mounira Msahli . 2021 . Machine Learning Detection for SMiShing Frauds. In 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC). 1\u20132. https:\/\/doi.org\/10 .1109\/CCNC49032.2021.9369640 10.1109\/CCNC49032.2021.9369640 Badr\u00a0Eddine Boukari, Akshaya Ravi, and Mounira Msahli. 2021. Machine Learning Detection for SMiShing Frauds. In 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC). 1\u20132. https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369640"},{"key":"e_1_3_2_1_8_1","unstructured":"E. Burke-Kennedy J. Brennan and C. Taylor. 2020. Bank of Ireland does U-turn after refusal to reimburse \u2018smishing\u2019 victims. https:\/\/www.irishtimes.com\/business\/financial-services\/bank-of-ireland-does-u-turn-after-refusal-to-reimburse-smishing-victims-1.4326502  E. Burke-Kennedy J. Brennan and C. Taylor. 2020. Bank of Ireland does U-turn after refusal to reimburse \u2018smishing\u2019 victims. https:\/\/www.irishtimes.com\/business\/financial-services\/bank-of-ireland-does-u-turn-after-refusal-to-reimburse-smishing-victims-1.4326502"},{"key":"e_1_3_2_1_9_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arXiv:1810.04805http:\/\/arxiv.org\/abs\/1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arXiv:1810.04805http:\/\/arxiv.org\/abs\/1810.04805 Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arXiv:1810.04805http:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_3_2_1_10_1","volume-title":"A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages. Future Internet 12, 9","author":"Ghourabi Abdallah","year":"2020","unstructured":"Abdallah Ghourabi , Mahmood\u00a0 A. Mahmood , and Qusay\u00a0 M. Alzubi . 2020. A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages. Future Internet 12, 9 ( 2020 ). https:\/\/doi.org\/10.3390\/fi12090156 10.3390\/fi12090156 Abdallah Ghourabi, Mahmood\u00a0A. Mahmood, and Qusay\u00a0M. Alzubi. 2020. A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages. Future Internet 12, 9 (2020). https:\/\/doi.org\/10.3390\/fi12090156"},{"key":"e_1_3_2_1_11_1","volume-title":"International conference on next generation computing technologies. Springer, 502\u2013512","author":"Goel Diksha","year":"2017","unstructured":"Diksha Goel and Ankit\u00a0Kumar Jain . 2017 . Smishing-classifier: a novel framework for detection of smishing attack in mobile environment . In International conference on next generation computing technologies. Springer, 502\u2013512 . Diksha Goel and Ankit\u00a0Kumar Jain. 2017. Smishing-classifier: a novel framework for detection of smishing attack in mobile environment. In International conference on next generation computing technologies. Springer, 502\u2013512."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110167"},{"key":"e_1_3_2_1_13_1","unstructured":"Paul\u00a0A Grassi James\u00a0L Fenton Elaine\u00a0M Newton Ray\u00a0A Perlner Andrew\u00a0R Regenscheid William\u00a0E Burr Justin\u00a0P Richer Naomi\u00a0B Lefkovitz Jamie\u00a0M Danker Yee-Yin Choong 2020. Digital identity guidelines: Authentication and lifecycle management [includes updates as of 03-02-2020]. (2020).  Paul\u00a0A Grassi James\u00a0L Fenton Elaine\u00a0M Newton Ray\u00a0A Perlner Andrew\u00a0R Regenscheid William\u00a0E Burr Justin\u00a0P Richer Naomi\u00a0B Lefkovitz Jamie\u00a0M Danker Yee-Yin Choong 2020. Digital identity guidelines: Authentication and lifecycle management [includes updates as of 03-02-2020]. (2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0157-5"},{"key":"e_1_3_2_1_15_1","unstructured":"Onur Karasoy and Serkan Ball\u0131. 2021. Spam SMS detection for Turkish language with deep text analysis and deep learning methods. https:\/\/link.springer.com\/article\/10.1007\/s13369-021-06187-1  Onur Karasoy and Serkan Ball\u0131. 2021. Spam SMS detection for Turkish language with deep text analysis and deep learning methods. https:\/\/link.springer.com\/article\/10.1007\/s13369-021-06187-1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Sumit Kumar Arup\u00a0Kumar Pal SK\u00a0Hafizul Islam and Mohammad Hammoudeh. 2021. Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Computing and Applications(2021) 1\u201326.  Sumit Kumar Arup\u00a0Kumar Pal SK\u00a0Hafizul Islam and Mohammad Hammoudeh. 2021. Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Computing and Applications(2021) 1\u201326.","DOI":"10.1007\/s00521-021-06054-y"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3081479"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.021"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-020-1647-3"},{"key":"e_1_3_2_1_21_1","unstructured":"Sergio Rojas-Galeano. 2021. Using BERT Encoding to Tackle the Mad-lib Attack in SMS Spam Detection. arxiv:2107.06400\u00a0[cs.CL]  Sergio Rojas-Galeano. 2021. Using BERT Encoding to Tackle the Mad-lib Attack in SMS Spam Detection. arxiv:2107.06400\u00a0[cs.CL]"},{"key":"e_1_3_2_1_22_1","volume-title":"Computer and network security essentials","author":"Saleem Jibran","unstructured":"Jibran Saleem and Mohammad Hammoudeh . 2018. Defense methods against social engineering attacks . In Computer and network security essentials . Springer , 603\u2013618. Jibran Saleem and Mohammad Hammoudeh. 2018. Defense methods against social engineering attacks. In Computer and network security essentials. Springer, 603\u2013618."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100393"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00815-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00557-0"},{"key":"e_1_3_2_1_26_1","unstructured":"Kaitao Song Xu Tan Tao Qin Jianfeng Lu and Tie-Yan Liu. 2020. MPNet: Masked and Permuted Pre-training for Language Understanding. arxiv:2004.09297\u00a0[cs.CL]  Kaitao Song Xu Tan Tao Qin Jianfeng Lu and Tie-Yan Liu. 2020. MPNet: Masked and Permuted Pre-training for Language Understanding. arxiv:2004.09297\u00a0[cs.CL]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00377-8"},{"key":"e_1_3_2_1_28_1","article-title":"SmiDCA","volume":"61","author":"Sonowal Gunikhan","year":"2018","unstructured":"Gunikhan Sonowal and K\u00a0S Kuppusamy . 2018 . SmiDCA : An Anti-Smishing Model with Machine Learning Approach. Comput. J. 61 , 8 (04 2018), 1143\u20131157. https:\/\/doi.org\/10.1093\/comjnl\/bxy039 arXiv:https:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1143\/25209236\/bxy039.pdf 10.1093\/comjnl Gunikhan Sonowal and K\u00a0S Kuppusamy. 2018. SmiDCA: An Anti-Smishing Model with Machine Learning Approach. Comput. J. 61, 8 (04 2018), 1143\u20131157. https:\/\/doi.org\/10.1093\/comjnl\/bxy039 arXiv:https:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1143\/25209236\/bxy039.pdf","journal-title":"An Anti-Smishing Model with Machine Learning Approach. Comput. J."},{"key":"e_1_3_2_1_29_1","unstructured":"Xu Tan. 2020. MPNet combines strengths of masked and permuted language modeling for language understanding. https:\/\/www.microsoft.com\/en-us\/research\/blog\/mpnet-combines-strengths-of-masked-and-permuted-language-modeling-for-language-understanding\/  Xu Tan. 2020. MPNet combines strengths of masked and permuted language modeling for language understanding. https:\/\/www.microsoft.com\/en-us\/research\/blog\/mpnet-combines-strengths-of-masked-and-permuted-language-modeling-for-language-understanding\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6636-0_51"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297350"},{"key":"e_1_3_2_1_32_1","volume-title":"A Discrete Hidden Markov Model for SMS Spam Detection. Applied Sciences 10, 14","author":"Xia Tian","year":"2020","unstructured":"Tian Xia and Xuemin Chen . 2020. A Discrete Hidden Markov Model for SMS Spam Detection. Applied Sciences 10, 14 ( 2020 ). https:\/\/doi.org\/10.3390\/app10145011 10.3390\/app10145011 Tian Xia and Xuemin Chen. 2020. A Discrete Hidden Markov Model for SMS Spam Detection. Applied Sciences 10, 14 (2020). https:\/\/doi.org\/10.3390\/app10145011"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWECAI50956.2020.00027"},{"key":"e_1_3_2_1_34_1","volume-title":"Advances in Neural Information Processing Systems, H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.). Vol.\u00a032. Curran Associates","author":"Yang Zhilin","year":"2019","unstructured":"Zhilin Yang , Zihang Dai , Yiming Yang , Jaime Carbonell , Russ\u00a0 R Salakhutdinov , and Quoc\u00a0 V Le. 2019. XLNet: Generalized Autoregressive Pretraining for Language Understanding . In Advances in Neural Information Processing Systems, H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.). Vol.\u00a032. Curran Associates , Inc .https:\/\/proceedings.neurips.cc\/paper\/ 2019 \/file\/dc6a7e655d7e5840e66733e9ee67cc69-Paper.pdf Zhilin Yang, Zihang Dai, Yiming Yang, Jaime Carbonell, Russ\u00a0R Salakhutdinov, and Quoc\u00a0V Le. 2019. XLNet: Generalized Autoregressive Pretraining for Language Understanding. In Advances in Neural Information Processing Systems, H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.). Vol.\u00a032. Curran Associates, Inc.https:\/\/proceedings.neurips.cc\/paper\/2019\/file\/dc6a7e655d7e5840e66733e9ee67cc69-Paper.pdf"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","location":"Dubai United Arab Emirates","acronym":"ICFNDS 2021"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508109","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":32,"alternative-id":["10.1145\/3508072.3508109","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508109","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}