2012 8th International Conference on Wireless Communications, Networking and Mobile Computing 2012
DOI: 10.1109/wicom.2012.6478740
|View full text |Cite
|
Sign up to set email alerts
|

Voice Spam Detecting Technique Based on User Behavior Pattern Model

Abstract: Voice spam is a major serious issue that would lead the people's lives a few inconveniences in recent years. In this paper, a model based on user behavior pattern is proposed to design an anti spam calls technique. The basic idea for the technique is that spammers with revenue motivation behave significantly distinct to legitimate callers. The characteristic parameters representing user behavior pattern can be joined to help filter spam calls among phone system. The proposed scheme is applicable for detecting … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The works are mainly divided into three research categories: (1) features-based SPITters detection scheme e.g., Refs. [1], [3], [5], [6], [7], (2) SPITters detection based on social network trustworthiness e.g., Refs. [8], [9], [10], [11] and (3) content-based SPIT detection e.g., Refs.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The works are mainly divided into three research categories: (1) features-based SPITters detection scheme e.g., Refs. [1], [3], [5], [6], [7], (2) SPITters detection based on social network trustworthiness e.g., Refs. [8], [9], [10], [11] and (3) content-based SPIT detection e.g., Refs.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al proposed call/receive ratio and normalized call frequency based features CI and F CD which are input into the kmeans clustering algorithm [6]. The scheme finds the center mass of a legitimate callers and classifies each caller by comparing the distance between the caller and a common reference model with the trained threshold.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations