2021
DOI: 10.1109/access.2021.3081479
|View full text |Cite
|
Sign up to set email alerts
|

A Spam Transformer Model for SMS Spam Detection

Abstract: In this paper, we aim to explore the possibility of the Transformer model in detecting the spam Short Message Service (SMS) messages by proposing a modified Transformer model that is designed for detecting SMS spam messages. The evaluation of our proposed spam Transformer is performed on SMS Spam Collection v.1 dataset and UtkMl's Twitter Spam Detection Competition dataset, with the benchmark of multiple established machine learning classifiers and state-of-the-art SMS spam detection approaches. In comparison … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(36 citation statements)
references
References 27 publications
0
19
0
Order By: Relevance
“…Language Transformer models have been playing a central role in text processing and text analysis in the realm of Natural Language Processing in recent times due to their massive potential for robust text embedding. An optimized Transformer based model for detecting SMS spam messages has been proposed by Xiaoxu et al [17] and evaluated the proposed model on benchmarking datasets. Sergio et al [21] look into whether language models that are sensitive to the semantics and context of words, such as Google's BERT, can be used to resist this adversarial attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Language Transformer models have been playing a central role in text processing and text analysis in the realm of Natural Language Processing in recent times due to their massive potential for robust text embedding. An optimized Transformer based model for detecting SMS spam messages has been proposed by Xiaoxu et al [17] and evaluated the proposed model on benchmarking datasets. Sergio et al [21] look into whether language models that are sensitive to the semantics and context of words, such as Google's BERT, can be used to resist this adversarial attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Where 𝜎 is a sigmoid function, 𝑊 and 𝑏 is the weight and bias of each gate which will continue to be updated during the training process, 𝑐 is a vector in the cell state section, ℎ 𝑡−1 is a hidden state in the previous unit and ⊙ is an operator for element-wise multiplication [1,25].…”
Section: Long Short-term Memorymentioning
confidence: 99%
“…Short message service (SMS) is a communication service in text format that has been used by humans in the last few decades and has become an embedded feature on every cellphone, be it a featured phone or smartphone. Since it is a service that has advantages such as low cost and eases to use, this service is also used by certain parties to send an unwanted text message, namely, spam message [1,2]. Spam is a type of message that is sent arbitrarily with various purposes such as promotions/advertising, borrowing money, announcements of sweepstakes, and such so that they are disturbing to mobile phone users [3], [4].…”
Section: Introductionmentioning
confidence: 99%
“…Quite recently released Twitter dataset distinguished more than five ways of twitter spams, including, but not limited to, profanity, insulting, hate speech, malicious links, fraudulent reviews [1]. Similarly, recent research efforts considered similar spamming approaches against other online social networks and short message service (SMS) [2], [3]. It is not surprising that twitter reviews spam policy periodically [4].…”
Section: Introductionmentioning
confidence: 99%
“…Earlier models utilized straightforward classification and categorization algorithms such as Support Vector MAchine (SVM), Naïve Bayes (NB), K-Nearest Neighbor (K-NN), and Decision Trees (DT) [3], [5], [6]. More advanced solutions explore opportunities of improvement as a result of utilizing deep learning (DL) techniques [2], [9].…”
Section: Introductionmentioning
confidence: 99%