{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T21:10:34Z","timestamp":1772053834214,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. For example, several businesses consider that text messages are more effective than e-mails. This is because 82% of SMSs are read within 5 min., but consumers only open one in four e-mails they receive. The importance of SMS for mobile phone users has attracted the attention of spammers. In fact, the volume of SMS spam has increased considerably in recent years with the emergence of new security threats, such as SMiShing. In this paper, we propose a hybrid deep learning model for detecting SMS spam messages. This detection model is based on the combination of two deep learning methods CNN and LSTM. It is intended to deal with mixed text messages that are written in Arabic or English. For the comparative evaluation, we also tested other well-known machine learning algorithms. The experimental results that we present in this paper show that our CNN-LSTM model outperforms the other algorithms. It achieved a very good accuracy of 98.37%.<\/jats:p>","DOI":"10.3390\/fi12090156","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T07:27:33Z","timestamp":1600414053000},"page":"156","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":127,"title":["A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5628-9016","authenticated-orcid":false,"given":"Abdallah","family":"Ghourabi","sequence":"first","affiliation":[{"name":"Department of Computer Science, Jouf University, Tabarjal 74728, Saudi Arabia"},{"name":"Higher School of Sciences and Technology of Hammam Sousse, University of Sousse, Hammam Sousse 4011, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9658-0972","authenticated-orcid":false,"given":"Mahmood A.","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jouf University, Tabarjal 74728, Saudi Arabia"},{"name":"Department of Information and Technology Systems, Cairo University, Giza 12613, Egypt"}]},{"given":"Qusay M.","family":"Alzubi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jouf University, Tabarjal 74728, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"ref_1","unstructured":"Morreale, M. (2020, June 15). Daily SMS Mobile Usage Statistics. Available online: https:\/\/www.smseagle.eu\/2017\/03\/06\/daily-sms-mobile-statistics\/."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1016\/j.future.2019.09.001","article-title":"Deep learning to filter SMS Spam","volume":"102","author":"Roy","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_3","unstructured":"Tatango (2020, June 15). Text Message Spam Infographic. Available online: https:\/\/www.tatango.com\/blog\/text-message-spam-infographic\/."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Goel, D., and Jain, A. (2017, January 30\u201331). Smishing-Classifier: A Novel Framework for Detection of Smishing Attack in Mobile Environment. Proceedings of the Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017), Dehradun, India.","DOI":"10.1007\/978-981-10-8660-1_38"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.cose.2017.12.006","article-title":"Mobile phishing attacks and defence mechanisms: State of art and open research challenges","volume":"73","author":"Goel","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_6","first-page":"21","article-title":"A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques","volume":"12","author":"Jain","year":"2020","journal-title":"IJESMA"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1016\/j.future.2020.03.021","article-title":"Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis","volume":"108","author":"Mishra","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Graves, A. (2012). Offline Arabic Handwriting Recognition with Multidimensional Recurrent Neural Networks. Guide to OCR for Arabic Scripts, Springer.","DOI":"10.1007\/978-1-4471-4072-6_12"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2825","DOI":"10.1109\/TCYB.2015.2490165","article-title":"Feature Set Evaluation for Offline Handwriting Recognition Systems: Application to the Recurrent Neural Network Model","volume":"46","author":"Chherawala","year":"2016","journal-title":"IEEE Trans. Cybern."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJMDEM.2016040101","article-title":"An Improved Arabic Handwritten Recognition System Using Deep Support Vector Machines","volume":"7","author":"Elleuch","year":"2016","journal-title":"Int. J. Multimed. Data Eng. Manag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.patcog.2016.11.011","article-title":"Contribution of recurrent connectionist language models in improving LSTM-based Arabic text recognition in videos","volume":"64","author":"Yousfi","year":"2017","journal-title":"Pattern Recognit."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"El-Desoky Mousa, A., Kuo, H.J., Mangu, L., and Soltau, H. (2013, January 26\u201331). Morpheme-based feature-rich language models using Deep Neural Networks for LVCSR of Egyptian Arabic. Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada.","DOI":"10.1109\/ICASSP.2013.6639311"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Deselaers, T., Hasan, S., Bender, O., and Ney, H. (2009, January 30\u201331). A Deep Learning Approach to Machine Transliteration. Proceedings of the Fourth Workshop on Statistical Machine Translation, Athens, Greece. StatMT \u201909.","DOI":"10.3115\/1626431.1626476"},{"key":"ref_14","unstructured":"Guzm\u00e1n, F., Bouamor, H., Baly, R., and Habash, N. (2016, January 11\u201316). Machine Translation Evaluation for Arabic using Morphologically-enriched Embeddings. Proceedings of the COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers, Osaka, Japan."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Jindal, V. A Personalized Markov Clustering and Deep Learning Approach for Arabic Text Categorization; In Proceedings of the ACL 2016 Student Research Workshop, Berlin, Germany, 7\u201312 August 2016.","DOI":"10.18653\/v1\/P16-3022"},{"key":"ref_16","unstructured":"Dahou, A., Xiong, S., Zhou, J., Haddoud, M.H., and Duan, P. (2016, January 11\u201316). Word Embeddings and Convolutional Neural Network for Arabic Sentiment Classification. Proceedings of the COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers, Osaka, Japan."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3086576","article-title":"AROMA: A Recursive Deep Learning Model for Opinion Mining in Arabic as a Low Resource Language","volume":"16","author":"Baly","year":"2017","journal-title":"ACM Trans. Asian Low-Resour. Lang. Inf. Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.jocs.2017.11.006","article-title":"Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels\u2019 reviews","volume":"27","author":"Qawasmeh","year":"2018","journal-title":"J. Comput. Sci."},{"key":"ref_19","unstructured":"Zhou, C., Sun, C., Liu, Z., and Lau, F.C.M. (2015). A C-LSTM Neural Network for Text Classification. arXiv."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s11235-016-0269-9","article-title":"S-Detector: An enhanced security model for detecting Smishing attack for mobile computing","volume":"66","author":"Joo","year":"2017","journal-title":"Telecommun. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Delvia Arifin, D., and Bijaksana, M.A. (2016, January 13\u201315). Enhancing spam detection on mobile phone Short Message Service (SMS) performance using FP-growth and Naive Bayes Classifier. In Proceedings of the 2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bandung, Indonesia.","DOI":"10.1109\/APWiMob.2016.7811442"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1093\/comjnl\/bxy039","article-title":"SmiDCA: An Anti-Smishing Model with Machine Learning Approach","volume":"61","author":"Sonowal","year":"2018","journal-title":"Comput. J."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"17","DOI":"10.4018\/JITR.2019040102","article-title":"Feature Based Approach for Detection of Smishing Messages in the Mobile Environment","volume":"12","author":"Jain","year":"2019","journal-title":"J. Inf. Technol. Res."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1016\/j.procs.2017.12.079","article-title":"Rule-Based Framework for Detection of Smishing Messages in Mobile Environment","volume":"125","author":"Jain","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.knosys.2016.05.001","article-title":"Text normalization and semantic indexing to enhance Instant Messaging and SMS spam filtering","volume":"108","author":"Almeida","year":"2016","journal-title":"Knowl. Based Syst."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Yadav, K., Kumaraguru, P., Goyal, A., Gupta, A., and Naik, V. (2011, January 1\u20132). SMSAssassin: Crowdsourcing Driven Mobile-Based System for SMS Spam Filtering. Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, Phoenix, AZ, USA. HotMobile \u201911.","DOI":"10.1145\/2184489.2184491"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Kaur, S., and Garhwal, S. (2015, January 4\u20135). SMS spam detection for Indian messages. Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India.","DOI":"10.1109\/NGCT.2015.7375198"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Almeida, T.A., Hidalgo, J.M.G., and Yamakami, A. (2011, January 19\u201322). Contributions to the Study of SMS Spam Filtering: New Collection and Results. Proceedings of the 11th ACM Symposium on Document Engineering, Mountain View, CA, USA. DocEng \u201911.","DOI":"10.1145\/2034691.2034742"},{"key":"ref_29","first-page":"299","article-title":"Creating a live, public short message service corpus: The NUS SMS corpus","volume":"47","author":"Chen","year":"2013","journal-title":"Lang. Resour. Eval."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2758","DOI":"10.1016\/j.eswa.2010.08.066","article-title":"A comparative study of TF*IDF, LSI and multi-words for text classification","volume":"38","author":"Zhang","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"ref_31","unstructured":"Mikolov, T., Chen, K., Corrado, G., and Dean, J. (2013, January 2\u20134). Efficient Estimation of Word Representations in Vector Space. Proceedings of the 1st International Conference on Learning Representations, ICLR 2013, Scottsdale, AZ, USA."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., and Manning, C. (2014, January 25\u201329). GloVe: Global Vectors for Word Representation. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar.","DOI":"10.3115\/v1\/D14-1162"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/9\/156\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:11:06Z","timestamp":1760177466000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/9\/156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":32,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["fi12090156"],"URL":"https:\/\/doi.org\/10.3390\/fi12090156","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,18]]}}}