{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:57:07Z","timestamp":1774717027793,"version":"3.50.1"},"reference-count":26,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T00:00:00Z","timestamp":1594252800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["DCA190332"],"award-info":[{"award-number":["DCA190332"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,7,9]]},"abstract":"<jats:p>The spam detection is a big issue in mobile message communication due to which mobile message communication is insecure. In order to tackle this problem, an accurate and precise method is needed to detect the spam in mobile message communication. We proposed the applications of the machine learning-based spam detection method for accurate detection. In this technique, machine learning classifiers such as Logistic regression (LR), K-nearest neighbor (K-NN), and decision tree (DT) are used for classification of ham and spam messages in mobile device communication. The SMS spam collection data set is used for testing the method. The dataset is split into two categories for training and testing the research. The results of the experiments demonstrated that the classification performance of LR is high as compared with K-NN and DT, and the LR achieved a high accuracy of 99%. Additionally, the proposed method performance is good as compared with the existing state-of-the-art methods.<\/jats:p>","DOI":"10.1155\/2020\/8873639","type":"journal-article","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:49:57Z","timestamp":1594338597000},"page":"1-6","source":"Crossref","is-referenced-by-count":56,"title":["Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9414-9137","authenticated-orcid":true,"given":"Luo","family":"GuangJun","sequence":"first","affiliation":[{"name":"Education Science Department, Xianyang Normal University, Xianyang, Shaanxi, China"}]},{"given":"Shah","family":"Nazir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Swabi, Swabi, Pakistan"}]},{"given":"Habib Ullah","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Accounting & Information Systems, College of Business & Economics, Qatar University, Doha, Qatar"}]},{"given":"Amin Ul","family":"Haq","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 61173, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1039621.1039625"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2018.1463136"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.03.014"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.01.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2553-9_23"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6264-3_67"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2011.09.023"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.7763\/jacn.2013.v1.27"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3390\/app9061152"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3390\/info10060209"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.01.001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2017.12.001"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1111\/j.0006-341x.2000.00909.x"},{"key":"17","year":"2013"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3860146"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2906350"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.08.024"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.001"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.015"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.07.033"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.008"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.007"},{"issue":"11","key":"28","first-page":"835","volume":"2","year":"2011","journal-title":"Computer Technology and Application"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.05.018"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.009"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8873639.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8873639.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8873639.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:50:05Z","timestamp":1594338605000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8873639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,9]]},"references-count":26,"alternative-id":["8873639","8873639"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8873639","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,9]]}}}