{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:30:40Z","timestamp":1770294640402,"version":"3.49.0"},"reference-count":65,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2023,9,20]]},"abstract":"<jats:p>The use of short message service (SMS) and e-mail have increased too much over the last decades. 80% of people do not read e-mails while 98% of cell phone users daily read their SMS. However, these communication media are unsafe and can produce malicious attacks called spam. The e-mails that pretend to be from a trusted company to provide \u201cfinancial or personal information\u201d are phishing e-mails. These e-mails contain some links; users might download malicious software on their computers when they click on them. Most techniques and models are developed to automatically detect these \u201cSMS and e-mails\u201d but none of them achieved 100% accuracy. In previous studies using machine learning (ML), spam detection using a small dataset has resulted in lower accuracy. To counter this problem, in this paper, multiple classifiers of ML and a classifier of deep learning (DL) were applied to the SMS and e-mail dataset for spam detection with higher accuracy. After conducting experiments on the real dataset, the researchers concluded that the proposed system performed better and more accurately than previously existing models. Specifically, the support vector machine (SVM) classifier outperformed all others. These results suggest that SVM is the optimal choice for classification purposes.<\/jats:p>","DOI":"10.1155\/2023\/6648970","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T23:05:08Z","timestamp":1695251108000},"page":"1-16","source":"Crossref","is-referenced-by-count":15,"title":["An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection"],"prefix":"10.1155","volume":"2023","author":[{"given":"Umair","family":"Maqsood","sequence":"first","affiliation":[{"name":"University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5810-6479","authenticated-orcid":true,"given":"Saif","family":"Ur Rehman","sequence":"additional","affiliation":[{"name":"University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan"}]},{"given":"Tariq","family":"Ali","sequence":"additional","affiliation":[{"name":"University Institute of Information Technology, PMAS-Arid Agriculture University, Rawalpindi 46000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6067-382X","authenticated-orcid":true,"given":"Khalid","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, D.I. Khan, KP, Pakistan"}]},{"given":"Tahani","family":"Alsaedi","sequence":"additional","affiliation":[{"name":"Applied College, Taibah University, Madina 42353, Saudi Arabia"}]},{"given":"Mahwish","family":"Kundi","sequence":"additional","affiliation":[{"name":"University of Leicester, Leicester, UK"}]}],"member":"311","reference":[{"key":"1","volume-title":"The Real Value of Sms to Businesses","author":"C. Sms"},{"key":"2","first-page":"259","article-title":"Contributions to the study of sms spam filtering: new collection and results","author":"T. A. Almeida"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1147\/jrd.2010.2066050"},{"key":"4","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1007\/978-981-13-0761-4_63","article-title":"Spam detection using ensemble learning","volume-title":"Harmony Search and Nature Inspired Optimization Algorithms","author":"V. Gupta","year":"2019"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.04.044"},{"key":"6","first-page":"9","article-title":"An evaluation of naive bayesian anti-spam filtering","author":"I. Androutsopoulos"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0157-5"},{"key":"8","article-title":"Robust classification of crisis-related data on social networks using convolutional neural networks","author":"D. T. Nguyen"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03851-5"},{"key":"10","first-page":"5716","article-title":"Learning to classify email: a survey, in 2015 International conference on machine learning and cybernetics","volume":"9","author":"X.-L. Wang","year":"2015","journal-title":"IEEE"},{"issue":"2","key":"11","first-page":"66","article-title":"A survey of machine learning techniques for spam filtering","volume":"12","author":"O. Saad","year":"2017","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"12","volume-title":"Number Of E-Mail Users Worldwide From 2017 To 2023","author":"Statista","year":"2019"},{"key":"13","volume-title":"The Shocking Truth about How many Emails","author":"C. Monitor","year":"2019"},{"key":"14","first-page":"391","article-title":"Manipulating e-mail server feedback for spam prevention","volume":"13","author":"O. A. Okunade","year":"2017","journal-title":"Arid Zone Journal of Engineering, Technology and Environment"},{"key":"15","article-title":"Daily number of spam emails sent worldwide as of january 2023, by country(in billions)","author":"statista","year":"2023"},{"key":"16","article-title":"Spam statistics","author":"firms","year":"2023"},{"key":"17","article-title":"99 firms","author":"firms","year":"2023"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1002\/0470858087","volume-title":"Mobile Messaging Technologies And Services Sms, Ems And Mms","author":"G. L. Bodic","year":"2002","edition":"2nd"},{"key":"19","article-title":"The state of mobile internet connectivity 2020","author":"Gsma","year":"2020"},{"key":"20","article-title":"Mobile behavior report","author":"Salesforce Marketing Cloud","year":"2014"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3024512"},{"key":"22","article-title":"2021 global spam scam report","author":"truecaller"},{"key":"23","article-title":"Number of smartphone users worldwide from 2013 to 2028","author":"statista"},{"key":"24","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1016\/j.future.2015.08.006","article-title":"Symbiotic organism search optimization based task scheduling in cloud computing environment","volume":"56","author":"M. Abdullahi","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"25","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.knosys.2018.04.025","article-title":"Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts","volume":"153","author":"M. A.-Z. Ala\u2019","year":"2018","journal-title":"Knowl-Based Syst."},{"key":"26","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.future.2016.05.036","article-title":"Investigating the deceptive information in twitter spam","volume":"72","author":"C. Chen","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"27","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.knosys.2017.11.040","article-title":"Early detection of spamming accounts in large-scale service provider networks","volume":"142","author":"Y. Cohen","year":"2018","journal-title":"Knowl-Based Syst."},{"key":"28","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.neucom.2014.12.034","article-title":"Spam filtering for short messages in adversarial environment","volume":"155","author":"P. P. Chan","year":"2015","journal-title":"Neurocomputing"},{"key":"29","first-page":"622","article-title":"A new and nasty way to flood networks with spam","volume":"7","author":"G. Faulkner","year":"1997","journal-title":"Computers & Security"},{"key":"30","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/S0167-4048(01)01014-8","article-title":"Fighting spam in europe","volume":"20","author":"B. Hancock","year":"2001","journal-title":"Computers & Security"},{"key":"31","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1016\/S0167-4048(02)01104-5","article-title":"Spam, scams, chains, hoaxes and other junk mail","volume":"21","author":"S. Hinde","year":"2002","journal-title":"Computers & Security"},{"key":"32","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.ins.2016.07.033","article-title":"Follow spam detection based on cascaded social information","volume":"369","author":"S. Jeong","year":"2016","journal-title":"Informing Science"},{"key":"33","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.knosys.2006.05.016","article-title":"An empirical study of three machine learning methods for spam filtering","volume":"20","author":"C. C. Lai","year":"2007","journal-title":"Knowl-Based Syst."},{"key":"34","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.neucom.2016.10.080","article-title":"Document representation and feature combination for deceptive spam review detection","volume":"254","author":"L. Li","year":"2017","journal-title":"Neurocomputing"},{"key":"35","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.cose.2012.01.007","article-title":"Polite sender: a resource-saving spam email countermeasure based on sender responsibilities and recipient justifications","volume":"31","author":"C. Vorakulpipat","year":"2012","journal-title":"Computers & Security"},{"key":"36","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.cose.2006.12.012","article-title":"Using header session messages to anti-spamming","volume":"26","author":"C. C. Wang","year":"2007","journal-title":"Computers & Security"},{"key":"37","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.future.2018.07.046","article-title":"Cognitive spammer: a framework for pagerank analysis with split by over-sampling and train by under-fitting","volume":"90","author":"A. Makkar","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"38","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1016\/j.eswa.2014.08.054","article-title":"Semi-supervised learning using frequent itemset and ensemble learning for sms classification","volume":"42","author":"I. Ahmed","year":"2015","journal-title":"Expert Systems with Applications"},{"key":"39","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.cose.2017.08.014","article-title":"Combating the evolving spammers in online social networks","volume":"72","author":"Q. Fu","year":"2018","journal-title":"Computers & Security"},{"key":"40","first-page":"435","article-title":"Uncovering social spammers: social honeypots+ machine learning","author":"K. Lee"},{"key":"41","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cose.2016.12.004","article-title":"Addressing the class imbalance problem in twitter spam detection using ensemble learning","volume":"69","author":"S. Liu","year":"2017","journal-title":"Computers & Security"},{"key":"42","first-page":"153","article-title":"Text and image-based spam email classification using knn, naive bayes and reverse dbscan algorithm","author":"A. Harisinghaney"},{"key":"43","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1016\/j.future.2019.09.001","article-title":"Deep learning to filter SMS Spam","volume":"102","author":"P. K. Roy","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"44","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s11235-016-0269-9","article-title":"An enhanced security model for detecting Smishing attack for mobile computing","volume":"66","author":"J. W. Joo","year":"2017","journal-title":"Telecommunication Systems"},{"key":"45","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1016\/j.procs.2017.12.079","article-title":"Rule-based framework for detection of smishing messages in mobile environment","volume":"125","author":"A. K. Jain","year":"2018","journal-title":"Procedia Computer Science"},{"key":"46","doi-asserted-by":"crossref","first-page":"17","DOI":"10.4018\/JITR.2019040102","article-title":"Feature based approach for detection of smishing messages in the mobile environment","volume":"12","author":"A. K. Jain","year":"2019","journal-title":"Journal of Information Technology Research"},{"key":"47","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1093\/comjnl\/bxy039","article-title":"An anti-smishing model with machine learning approach","volume":"61","author":"G. Sonowal","year":"2018","journal-title":"The Computer Journal"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3100-y"},{"key":"49","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1016\/j.future.2020.03.021","article-title":"A security model to detect smishing through SMS content analysis and URL behavior analysis","volume":"108","author":"S. Mishra","year":"2020","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"50","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.asej.2018.06.001","article-title":"Efficient email classification approach based on semantic methods","volume":"9","author":"E. M. Bahgat","year":"2018","journal-title":"Ain Shams Engineering Journal"},{"key":"51","article-title":"Classification of spam emails through hierarchical clustering and supervised learning","author":"F. Janez-Martino","year":"2020"},{"key":"52","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.procs.2019.11.150","article-title":"SuriayatiChuprat, \u201cSMS spam message detection using term frequenct-inverse document frequency and random forest algorithm","volume":"161","author":"N. F. M. Azmi","year":"2019","journal-title":"Procedia Computer Science"},{"issue":"9","key":"53","article-title":"An efficient spam classification system using ensemble machine learning algorithm","volume":"5","author":"A. Lakshmanarao","year":"2018","journal-title":"Journal of Applied Science and Computations"},{"key":"54","article-title":"Ajay Rana, \u201cSMS spam filtering using supervised machine learning algorithms","author":"G. D. PavasNavaney"},{"key":"55","first-page":"1","article-title":"Machine intelligence based hybrid classifier for spam detection and sentiment analysis of SMS messages","volume":"10","author":"U. Srinivasarao","year":"2023","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"56","first-page":"1501","article-title":"SMS spam classification\u2013simple deep learning models with higher accuracy using BUNOW and GloVe word embedding","volume":"26","author":"S. Giri","year":"2023","journal-title":"Journal of Applied Science and Engineering"},{"issue":"1-2","key":"57","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1504\/IJAIP.2023.128084","article-title":"Email spam detection using bagging and boosting of machine learning classifiers","volume":"24","author":"U. Bhardwaj","year":"2023","journal-title":"International Journal of Advanced Intelligence Paradigms"},{"key":"58","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.aej.2023.01.048","article-title":"Deep learning-based spam image filtering","volume":"68","author":"W. M. Salama","year":"2023","journal-title":"Alexandria Engineering Journal"},{"issue":"2","key":"59","first-page":"1","article-title":"Spam classification: genetically optimized passive-aggressive approach","volume":"4","author":"P. Naravajhula","year":"2023","journal-title":"SN Computer Science"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5679-1_31"},{"key":"61","first-page":"80","article-title":"Enhancing spam detection on mobile phone short message service (SMS) performance using FP-growth and naive bayes classifier","author":"D. Delvia Arifin"},{"key":"62","article-title":"Spam sms\/email classification 98% accuracy","author":"kaggle","year":"2020"},{"key":"63","doi-asserted-by":"crossref","article-title":"Contributions to the study of SMS spam filtering: new collection and results","author":"T. A. Almeida","DOI":"10.1145\/2034691.2034742"},{"key":"64","first-page":"325","article-title":"A fog-augmented machine learning based SMS spam detection and classification system","author":"S. Bosaeed"},{"issue":"9","key":"65","first-page":"721","article-title":"Eshort message service spam detection and filtering using machine learning approach","volume":"12","author":"M. Arulprakash","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6648970.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6648970.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6648970.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T23:05:33Z","timestamp":1695251133000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2023\/6648970\/"}},"subtitle":[],"editor":[{"given":"Jyotismita","family":"Chaki","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":65,"alternative-id":["6648970","6648970"],"URL":"https:\/\/doi.org\/10.1155\/2023\/6648970","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"value":"1687-9732","type":"electronic"},{"value":"1687-9724","type":"print"}],"subject":[],"published":{"date-parts":[[2023,9,20]]}}}