{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:28:41Z","timestamp":1777854521036,"version":"3.51.4"},"reference-count":57,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2016,7,10]],"date-time":"2016-07-10T00:00:00Z","timestamp":1468108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2017,2]]},"abstract":"<jats:p>SMS spam detection is an important task where spam SMS messages are identified and filtered. As greater numbers of SMS messages are communicated every day, it is very difficult for a user to remember and correlate the newer SMS messages received in context to previously received SMS. SMS threads provide a solution to this problem. In this work the problem of SMS spam detection and thread identification is discussed and a state of the art clustering-based algorithm is presented. The work is planned in two stages. In the first stage the binary classification technique is applied to categorize SMS messages into two categories namely, spam and non-spam SMS; then, in the second stage, SMS clusters are created for non-spam SMS messages using non-negative matrix factorization and K-means clustering techniques. A threading-based similarity feature, that is, time between consecutive communications, is described for the identification of SMS threads, and the impact of the time threshold in thread identification is also analysed experimentally. Performance parameters like accuracy, precision, recall and F-measure are also evaluated. The SMS threads identified in this proposed work can be used in applications like SMS thread summarization, SMS folder classification and other SMS management-related tasks.<\/jats:p>","DOI":"10.1177\/0165551515616310","type":"journal-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T21:29:45Z","timestamp":1449178185000},"page":"75-87","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":53,"title":["SMS spam filtering and thread identification using bi-level text classification and clustering techniques"],"prefix":"10.1177","volume":"43","author":[{"given":"Naresh Kumar","family":"Nagwani","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology Raipur, India"}]},{"given":"Aakanksha","family":"Sharaff","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology Raipur, India"}]}],"member":"179","published-online":{"date-parts":[[2016,7,10]]},"reference":[{"issue":"7","key":"bibr1-0165551515616310","first-page":"297","volume":"8","author":"Ranjbarian B","year":"2012","journal-title":"Journal of American Science"},{"key":"bibr2-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515587854"},{"key":"bibr3-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516772"},{"key":"bibr4-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/2034691.2034742"},{"issue":"1","key":"bibr5-0165551515616310","first-page":"1","volume":"2","author":"Almeida TA","year":"2013","journal-title":"International Journal of Information Security Science"},{"key":"bibr6-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.11.003"},{"issue":"5","key":"bibr7-0165551515616310","first-page":"67","volume":"19","author":"Uysal AK","year":"2013","journal-title":"Electronics and Electrical Engineering"},{"key":"bibr8-0165551515616310","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.6.844-851"},{"key":"bibr9-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSS.2009.5304008"},{"key":"bibr10-0165551515616310","first-page":"429","volume-title":"Proceedings of IEEE 11th international conference on computer and information technology","author":"Nuruzzaman MT"},{"key":"bibr11-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2012.6204485"},{"key":"bibr12-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2012.6246947"},{"key":"bibr13-0165551515616310","first-page":"1315","volume-title":"Proceedings of the IEEE International Conference on Computer Science and Information Processing (CSIP 2012)","author":"Liu G","year":"2012"},{"key":"bibr14-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2012.6419492"},{"key":"bibr15-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.3"},{"key":"bibr16-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321486"},{"key":"bibr17-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1561\/1500000006"},{"key":"bibr18-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.053"},{"issue":"2","key":"bibr19-0165551515616310","first-page":"140","volume":"11","author":"Abdulla S","year":"2014","journal-title":"The International Arab Journal of Information Technology"},{"key":"bibr20-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184491"},{"key":"bibr21-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001817"},{"key":"bibr22-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.211"},{"key":"bibr23-0165551515616310","doi-asserted-by":"publisher","DOI":"10.5815\/ijieeb.2012.01.06"},{"key":"bibr24-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348526"},{"key":"bibr25-0165551515616310","first-page":"3","volume-title":"Proceedings of the world congress on engineering 2013 (WCE 2013)","author":"Modupe A","year":"2013"},{"key":"bibr26-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148180"},{"key":"bibr27-0165551515616310","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.3.10.86-93"},{"issue":"2","key":"bibr28-0165551515616310","first-page":"207","volume":"17","author":"Balali A","year":"2013","journal-title":"ComputacionySistemas"},{"key":"bibr29-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.195"},{"issue":"12","key":"bibr30-0165551515616310","first-page":"1284","volume":"4","author":"Joshi S","year":"2011","journal-title":"Very Large Databases (VLDB)"},{"key":"bibr31-0165551515616310","volume-title":"Proceedings of recent advances in natural language processing (RANLP)","author":"Ani N","year":"2003"},{"key":"bibr32-0165551515616310","doi-asserted-by":"publisher","DOI":"10.3115\/1613984.1614011"},{"key":"bibr33-0165551515616310","doi-asserted-by":"publisher","DOI":"10.3115\/1220355.1220434"},{"key":"bibr34-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/ETTandGRS.2008.321."},{"key":"bibr35-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.09.007"},{"key":"bibr36-0165551515616310","first-page":"85","volume-title":"Proceedings of the 7th international natural language generation conference (INLG 2012)","author":"Duboue PA.","year":"2012"},{"key":"bibr37-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2003.1249028"},{"key":"bibr38-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1177\/0165551513494638"},{"key":"bibr39-0165551515616310","volume-title":"Proceedings of third conference on email and anti-spam (CEAS 2006)","author":"Yeh JY","year":"2006"},{"key":"bibr40-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-015-0025-5"},{"key":"bibr41-0165551515616310","first-page":"338","volume-title":"Proceedings of the 11th conference on uncertainty in artificial intelligence","author":"John GH","year":"1995"},{"key":"bibr42-0165551515616310","first-page":"41","volume-title":"Proceedings of the 15th national conference on artificial intelligence (AAAI 1998) workshop on learning for text categorization","author":"Mccallum A","year":"1998"},{"key":"bibr43-0165551515616310","unstructured":"EL-Manzalawy Y. WLSVM: Integrating libsvm into WEKA environment, 2005, http:\/\/www.cs.iastate.edu\/~yasser\/wlsvm\/ (accessed 8 February 2014)."},{"key":"bibr44-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"bibr45-0165551515616310","first-page":"993","volume":"3","author":"Blei DM","year":"2003","journal-title":"The Journal of Machine Learning Research"},{"key":"bibr46-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1038\/44565"},{"key":"bibr47-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860485"},{"key":"bibr48-0165551515616310","volume-title":"The text mining handbook: Advanced approaches in analyzing unstructured data","author":"Feldman R","year":"2007"},{"key":"bibr49-0165551515616310","volume-title":"Data mining: Concepts and technique","author":"Han J","year":"2009","edition":"2"},{"issue":"1","key":"bibr50-0165551515616310","first-page":"100","volume":"28","author":"Hartigan JA","year":"1979","journal-title":"Journal of the Royal Statistical Society"},{"key":"bibr51-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216331"},{"key":"bibr52-0165551515616310","unstructured":"McCallum AK. Mallet: A machine learning for language toolkit, 2002."},{"key":"bibr53-0165551515616310","unstructured":"Witten IH, Frank E, Trigg LE, Weka: Practical machine learning tools and techniques with Java implementations, 1999."},{"key":"bibr54-0165551515616310","unstructured":"Chang CC, Lin CJ. LIBSVM \u2013 A Library for Support Vector Machines, 2001, http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/ (accessed 8 February 2014)."},{"key":"bibr55-0165551515616310","unstructured":"UCI Spam Collection, http:\/\/archive.ics.uci.edu\/ml\/datasets\/SMS+Spam+Collection# (accessed 5 January 2014)."},{"key":"bibr56-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1007\/s11412\u2013010\u20139088\u20132"},{"key":"bibr57-0165551515616310","doi-asserted-by":"publisher","DOI":"10.1186\/2045-709X-20-20"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551515616310","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0165551515616310","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551515616310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:09:22Z","timestamp":1777504162000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551515616310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,10]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["10.1177\/0165551515616310"],"URL":"https:\/\/doi.org\/10.1177\/0165551515616310","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,10]]}}}