2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC) 2020
DOI: 10.1109/fmec49853.2020.9144833
|View full text |Cite
|
Sign up to set email alerts
|

A Fog-Augmented Machine Learning based SMS Spam Detection and Classification System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 15 publications
0
17
0
Order By: Relevance
“…Secondly, existing approaches assume a fixed network configuration and attack models, and use fixed strategies in devising solutions. The ultimate aim is to optimally migrate and place data, analytics, and other computations in these environments such that security, privacy, energy efficiency and QoS demands of these applications and the environments are best satisfied [8,[70][71][72][73].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Secondly, existing approaches assume a fixed network configuration and attack models, and use fixed strategies in devising solutions. The ultimate aim is to optimally migrate and place data, analytics, and other computations in these environments such that security, privacy, energy efficiency and QoS demands of these applications and the environments are best satisfied [8,[70][71][72][73].…”
Section: Discussionmentioning
confidence: 99%
“…Cyber-physical systems (CPSs) such as smart cities and societies are examples of such environments [1,2]. The vision is to make systems and applications coexist in these environments, interacting with each other, producing and consuming historical and real-time information emanating from humans, sensors, and machines, and improving quality of life in many areas, for example, transportation [3][4][5][6], healthcare [7], and others [8].…”
Section: Introductionmentioning
confidence: 99%
“…Utilizing machine learning methods, multiple researchers have suggested novel and state-of-the-art smishing classifiers [11,28]. Sahar et al [6] have developed a system that includes numerous machine learning (ML) based classifiers that are built to utilize three classification methods -Naive Bayes (NB), Support Vector Machine (SVM), and Naive Bayes Multinomial (NBM) -as well as five preprocessing and feature extraction methods.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Usually, works conducted on ML involved actuators, sensors, and low-level fog nodes. However, at a higher level, fog nodes can handle frameworks like Weka [31] and Scikit-learn to implement many AI applications. ML is used to execute, optimize, assign, or monitor functional tasks such as clustering, routing, duty-cycle management, data aggregation, and medium access control [32].…”
Section: Introductionmentioning
confidence: 99%