{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:12Z","timestamp":1740141792188,"version":"3.37.3"},"reference-count":19,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"National Natural Science Foundation of China Civil Aviation joint Fund","award":["U1433116","NZ2013306","JSJC2013605C009"],"award-info":[{"award-number":["U1433116","NZ2013306","JSJC2013605C009"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["U1433116","NZ2013306","JSJC2013605C009"],"award-info":[{"award-number":["U1433116","NZ2013306","JSJC2013605C009"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"333 Project of Jiangsu Province and the Technology Foundation","award":["U1433116","NZ2013306","JSJC2013605C009"],"award-info":[{"award-number":["U1433116","NZ2013306","JSJC2013605C009"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,4,1]]},"abstract":"<jats:p> With the rapid development of mobile telecommunication, voice call spam has become a growing problem in China. Many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. Nowadays, the popular method for the task of mining call spammers has been performed by different applications on smartphones. These applications combine manual and automatic methods to detect spammers. Although the results of these client-based solutions are quite satisfying, it is extremely unfortunate that many people still use feature phones, which can not be equipped with third party applications. In this paper, we propose a server-based solution and take a call log file as an example, to analyze the characteristics of mobile call patterns. A time-based graph model and a simple and effective call log rank (CLRank) algorithm with ranking and classification were proposed to find potential call spammers. Compared with existing methods, our model just uses link information, and thus protects user privacy to the maximum extent. Experimental results show that our proposed model can find spammers from call logs automatically, dynamically, and effectively (with 84.5~91.8% of accuracy) without any manual interventions. <\/jats:p>","DOI":"10.1155\/2015\/143745","type":"journal-article","created":{"date-parts":[[2015,4,15]],"date-time":"2015-04-15T21:00:43Z","timestamp":1429131643000},"page":"143745","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mining Potential Spammers from Mobile Call Logs"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3437-5671","authenticated-orcid":false,"given":"Zhipeng","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu 210016, China"},{"name":"Department of Software Engineering, Nanjing University of Posts and Communications, Nanjing, Jiangsu 210003, China"}]},{"given":"Dechang","family":"Pi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu 210016, China"}]},{"given":"Yunfang","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Nanjing University of Posts and Communications, Nanjing, Jiangsu 210003, China"}]}],"member":"179","published-online":{"date-parts":[[2015,4,15]]},"reference":[{"key":"B1-2015-143745","doi-asserted-by":"publisher","DOI":"10.1145\/2428556.2428573"},{"key":"B2-2015-143745","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8579-7"},{"key":"B3-2015-143745","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516772"},{"key":"B4-2015-143745","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184491"},{"key":"B5-2015-143745","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.132"},{"volume-title":"A Learning Approach to Spam DetectionBased on Social Networks","year":"2007","author":"Lam H.-Y.","key":"B6-2015-143745"},{"key":"B7-2015-143745","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.260"},{"key":"B8-2015-143745","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0786-z"},{"key":"B9-2015-143745","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/218521"},{"key":"B10-2015-143745","doi-asserted-by":"publisher","DOI":"10.3233\/MIS-130173"},{"key":"B11-2015-143745","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0798-8"},{"key":"B12-2015-143745","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.3"},{"volume-title":"Proceedings of the 4th Conference on email and anti-spam (CEAS '07)","author":"Balasubramaniyan V.","key":"B13-2015-143745"},{"key":"B14-2015-143745","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"B15-2015-143745","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315288"},{"key":"B16-2015-143745","doi-asserted-by":"publisher","DOI":"10.1145\/1189769.1189779"},{"key":"B17-2015-143745","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"B18-2015-143745","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.046135"},{"key":"B19-2015-143745","first-page":"576","volume-title":"Proceedings of the 30th International Conference on Very Large Data Bases","volume":"30","author":"Gy\u00f6ngyi Z."}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/143745","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/143745","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/143745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T06:30:27Z","timestamp":1620282627000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/143745"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,4,1]]}},"alternative-id":["10.1155\/2015\/143745"],"URL":"https:\/\/doi.org\/10.1155\/2015\/143745","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,4,1]]}}}