{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:39:40Z","timestamp":1773153580607,"version":"3.50.1"},"reference-count":30,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2020]]},"DOI":"10.12720\/jcm.15.4.325-331","type":"journal-article","created":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T09:58:36Z","timestamp":1589536716000},"page":"325-331","source":"Crossref","is-referenced-by-count":7,"title":["Detecting Bengali Spam SMS Using Recurrent Neural Network"],"prefix":"10.12720","author":[{"name":"East West University, Dhaka, 1212, Bangladesh","sequence":"first","affiliation":[]},{"given":"Md. Mohsin","family":"Uddin","sequence":"first","affiliation":[]},{"given":"Monica","family":"Yasmin","sequence":"additional","affiliation":[]},{"given":"M Saddam Hossain","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Md Istianatur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Tabassum","family":"Islam","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2020]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","unstructured":"[1] M. A. Shafi'I, M. S. A. Latiff, H. Chiroma, et al., \"A review on mobile SMS spam filtering techniques,\" IEEE Access, vol. 5, pp. 15650-15666, 2017.","DOI":"10.1109\/ACCESS.2017.2666785"},{"key":"ref1","doi-asserted-by":"publisher","unstructured":"[2] P. Poomka, W. Pongsena, N. Kerdprasop, and K. Kerdprasop, \"SMS spam detection based on long short-term memory and gated recurrent unit,\" International Journal of Future Computer and Communication vol. 8, no.1, pp. 11-15, 2019.","DOI":"10.18178\/ijfcc.2019.8.1.532"},{"key":"ref2","doi-asserted-by":"publisher","unstructured":"[3] L. N. Lota and B. M. M. Hossain, \"A systematic literature review on SMS spam detection techniques,\" International Journal of Information Technology and Computer Science, vol. 9, no. 7, pp. 42-50, 2017.","DOI":"10.5815\/ijitcs.2017.07.05"},{"key":"ref3","doi-asserted-by":"publisher","unstructured":"[4] Q. Xu, E. W. Xiang, and Q. Yang, \"SMS spam detection using non-content features,\" IEEE Intelligent Systems, vol. 27, no. 6, pp. 44-51, 2012.","DOI":"10.1109\/MIS.2012.3"},{"key":"ref4","unstructured":"[5] T. Almeida, J. M. G. Hidalgo, and T. P. Silva, \"Towards sms spam filtering: Results under a new dataset,\" International Journal of Information Security Science, vol. 2, no. 1, pp. 1-18, 2013."},{"key":"ref5","unstructured":"[6] K. P. Murphy, \"Naive bayes classifiers,\" University of British Columbia, 2006."},{"key":"ref6","unstructured":"[7] B. Scholkopf and A. J. Smola, Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond, MIT Press, 2001."},{"key":"ref7","unstructured":"[8] D. G. Kleinbaum, K. Dietz, M. Gail, M. Klein, and M. Klein, Logistic Regression, New York: Springer-Verlag, 2002."},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"[9] S. Hochreiter and J. Schmidhuber, \"Long short-term memory,\" Neural computation, vol. 9, no. 8, pp. 1735-1780, 1997.","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"[10] I. Ahmed, D. Guan, and T. C. Chung, \"Sms classification based on nav\u00efe bayes classifier and apriori algorithm frequent itemset,\" International Journal of Machine Learning and Computing, vol. 4, no. 2, p. 183, 2014.","DOI":"10.7763\/IJMLC.2014.V4.409"},{"key":"ref10","doi-asserted-by":"publisher","unstructured":"[11] T. A. Almeida, J. M. G. Hidalgo, and A. Yamakami, \"Contributions to the study of SMS spam filtering: new collection and results,\" in Proc. 11th ACM Symposium on Document Engineering, September 2011, pp. 259-262.","DOI":"10.1145\/2034691.2034742"},{"key":"ref11","doi-asserted-by":"publisher","unstructured":"[12] S. Bhatia, \"A study on spam detection methods for safe SMS communication,\" International Journal of Engineering & Technology, vol. 7, pp. 790-792, 2018.","DOI":"10.14419\/ijet.v7i3.12.16502"},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"[13] A. Narayan and P. Saxena, \"The curse of 140 characters: Evaluating the efficacy of sms spam detection on android,\" in Proc. Third ACM workshop on Security and Privacy in Smartphones & Mobile Devices, 2013, pp. 33-42.","DOI":"10.1145\/2516760.2516772"},{"key":"ref13","doi-asserted-by":"publisher","unstructured":"[14] K. Yadav, S. K. Saha, P. Kumaraguru, and R. Kumra, \"Take control of your smses: Designing an usable spam sms filtering system,\" in Proc. IEEE 13th International Conference on Mobile Data Management, 2012, pp. 352-355.","DOI":"10.1109\/MDM.2012.54"},{"key":"ref14","doi-asserted-by":"publisher","unstructured":"[15] E. G. Dadaa, J. S. Bassia, H. Chiromab, S. M. Abdulhamidc, A. O. Adetunmbid, and O. E. Ajibuwae, \"Machine learning for email spam filtering: Review, approaches and open research problems,\" 2019.","DOI":"10.1016\/j.heliyon.2019.e01802"},{"key":"ref15","doi-asserted-by":"publisher","unstructured":"[16] T. Islam, S. Latif, and N. Ahmed, \"Using social networks to detect malicious bangla text content,\" in Proc. 1st International Conference on Advances in Science, Engineering and Robotics Technology, May 2019, pp. 1-4.","DOI":"10.1109\/ICASERT.2019.8934841"},{"key":"ref16","unstructured":"[17] F. Olsson, \"A literature survey of active machine learning in the context of natural language processing,\" Swedish Institute of Computer Science, 2009."},{"key":"ref17","unstructured":"[18] Pedregosa, Fabian, et al., \"Scikit-learn: Machine learning in Python,\" Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011."},{"key":"ref18","doi-asserted-by":"publisher","unstructured":"[19] T. Mikolov, M. Karafi\u00e1t, L. Burget, J. \u010cernock\u00fd, and S. Khudanpur, \"Recurrent neural network based language model,\" in Proc. Eleventh Annual Conference of the International Speech Communication Association, 2010","DOI":"10.1109\/ICASSP.2011.5947611"},{"key":"ref19","unstructured":"[20] R. Pascanu, T. Mikolov, and Y. Bengio, \"On the difficulty of training recurrent neural networks,\" in Proc. International Conference on Machine Learning, February 2013, pp. 1310-1318."},{"key":"ref20","doi-asserted-by":"publisher","unstructured":"[21] K. Cho, B. V. Merri\u00ebnboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio, \"Learning phrase representations using RNN encoder-decoder for statistical machine translation,\" arXiv preprint arXiv:1406.1078, 2014.","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref21","unstructured":"[22] V. Nair and G. E. Hinton, \"Rectified linear units improve restricted boltzmann machines,\" in Proc. 27th International Conference on Machine Learning (ICML-10), 2010, pp. 807-814."},{"key":"ref22","unstructured":"[23] T. Tijmen and H. Geoffrey, \"Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude,\" COURSERA: Neural Networks for Machine Learning, 2012."},{"key":"ref23","unstructured":"[24] J. Duchi, E. Hazan, and Y. Singer, \"Adaptive subgradient methods for online learning and stochastic optimization,\" Journal of Machine Learning Research, vol. 12, no. 7, pp. 2121-2159, 2011."},{"key":"ref24","unstructured":"[25] D. P. Kingma and J. Ba, \"Adam: A method for stochastic optimization,\" arXiv preprint arXiv:1412.6980, 2014"},{"key":"ref25","unstructured":"[26] M. D. Zeiler, \"ADADELTA: An adaptive learning rate method,\" arXiv preprint arXiv: 1212.5701, 2012."},{"key":"ref26","doi-asserted-by":"publisher","unstructured":"[27] T. Zhang, \"Solving large scale linear prediction problems using stochastic gradient descent algorithms,\" in Proc. Twenty-First International Conference on Machine Learning, July 2004, p. 116.","DOI":"10.1145\/1015330.1015332"},{"key":"ref27","unstructured":"[28] D. L. Olson and D. Delen, Advanced Data Mining Techniques, Springer Science & Business Media, 2008."},{"key":"ref28","doi-asserted-by":"publisher","unstructured":"[29] L. Torrey and J. Shavlik, \"Transfer learning,\" in Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques, IGI Global, 2010, pp. 242-264.","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"ref29","doi-asserted-by":"publisher","unstructured":"[30] G. E. Hinton, \"Deep belief networks,\" Scholarpedia, vol. 4, no. 5, p. 5947, 2009.","DOI":"10.4249\/scholarpedia.5947"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2020\/0311\/20200311102822925.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T07:26:03Z","timestamp":1609745163000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/show-238-1530-1.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":30,"URL":"https:\/\/doi.org\/10.12720\/jcm.15.4.325-331","relation":{},"ISSN":["1796-2021"],"issn-type":[{"value":"1796-2021","type":"print"}],"subject":[],"published":{"date-parts":[[2020]]}}}