A Competent Spam Prediction Technique by Supervised Deep Learning Classifiers

Since the last couple of decades, mobile phone users have been rapidly increased as the SMS are easy, less expensive and independent upon cell phone operating system. SMS has become one of the popular communication media throughout the world. 3.5 billion or 80% active users, throughout the word, use mobile SMS as a communication medium. Out of this huge number of SMS, a large number of SMS are spam, generated by offenders for a number of reasons. Due to the spam SMS, criminal gangs become stronger and perform different criminal activities. Short Message Service (SMS) has become one of the most important media of communications due to the rapid increase of mobile users and it’s easy to use operating mechanism. This flood of SMS goes with the problem of spam SMS that are generated by spurious users. The detection of spam SMS has gotten more attention of researchers in recent times and is treated with a number of different machine learning approaches. The traditional methods do not produce good results. In this work, Proposed approach uses deep learning classifiers to predict spam messages.

[1]  William D. Penny,et al.  Bayesian Approaches to Gaussian Mixture Modeling , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[2]  Kristof Van Laerhoven Combining the Self-Organizing Map and K-Means Clustering for On-Line Classification of Sensor Data , 2001, ICANN.

[3]  Chao Huang,et al.  Automatic accent identification using Gaussian mixture models , 2001, IEEE Workshop on Automatic Speech Recognition and Understanding, 2001. ASRU '01..

[4]  Mohammad Al Hasan,et al.  Link prediction using supervised learning , 2006 .

[5]  Georgia Koutrika,et al.  Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges , 2007, IEEE Internet Computing.

[6]  Marco Wiering,et al.  Ensemble Algorithms in Reinforcement Learning , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  Yi Liu,et al.  SemiBoost: Boosting for Semi-Supervised Learning , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Dan Wu,et al.  K-means based clustering on mobile usage for social network analysis purpose , 2010, 2010 6th International Conference on Advanced Information Management and Service (IMS).

[9]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[10]  Graham Cormode,et al.  Node Classification in Social Networks , 2011, Social Network Data Analytics.

[11]  Songqing Chen,et al.  Spammer Behavior Analysis and Detection in User Generated Content on Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[12]  Amit Anand Amlesahwaram Spammer Detection on Online Social Networks , 2012 .

[13]  Hong Jia,et al.  A New Distance Metric for Unsupervised Learning of Categorical Data , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[14]  Mokdong Chung,et al.  A prediction model based on Big Data analysis using hybrid FCM clustering , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[15]  Songtao Lu,et al.  Sparsity-aware adaptive link combination approach over distributed networks , 2014 .

[16]  Alimohammad Latif,et al.  Reinforcement learning based search (RLS) algorithm in social networks , 2015, 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP).

[17]  Songtao Lu,et al.  Accelerated algorithms for Eigen-Value Decomposition with application to spectral clustering , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[18]  Tapani Raiko,et al.  Semi-supervised Learning with Ladder Networks , 2015, NIPS.

[19]  Tommi Mikkonen,et al.  From the Internet of Things to the Internet of People , 2015, IEEE Internet Computing.

[20]  Lina Yao,et al.  Web-Based Management of the Internet of Things , 2015, IEEE Internet Computing.

[21]  Athanasios A. Rontogiannis,et al.  A Novel Adaptive Possibilistic Clustering Algorithm , 2014, IEEE Transactions on Fuzzy Systems.

[22]  Feng Xia,et al.  ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks , 2017, IEEE/ACM Transactions on Networking.

[23]  Tie Qiu,et al.  A Local-Optimization Emergency Scheduling Scheme With Self-Recovery for a Smart Grid , 2017, IEEE Transactions on Industrial Informatics.

[24]  Tie Qiu,et al.  EABS: An Event-Aware Backpressure Scheduling Scheme for Emergency Internet of Things , 2018, IEEE Transactions on Mobile Computing.