Title : A Spam Transformer Model for SMS Spam Detection

Author : Kanipakam Bhanu Moorty, P.Mohan, K.Vishnu Vardan Varma, Pradeep Burri

Abstract :

Spam emails, also referred to as non-self,are commercial or harmful unsolicited emails, sent to attack either a particular entity or an organization or a community of individuals. In addition to marketing, these It which contain ties to websites hosting phishing or malware set up to steal sensitive details. In this post, a review on the feasibility of using an anomaly anomaly negative selection algorithm (NSA) It introduces the detector applied to spam filtering. The high efficiency and low false detection of the NSA is Pace. Via three detection stages, the built system intelligently works to eventually decide Legitimacy of an email depending on the information collected in the training process. The unit works by Elimination is analogous to the functionality of T-cells in biological processes by negative selection. It It has been found that efficiency tends to increase with the addition of more datasets, this culminated in a 6% improvement in the identific

[ PDF ]

Indexing

Impact Indexing 2 Google Index Indexing 4 Indexing 5

Submit Article

Email: editor@ijeri.info

International Journal of Engineering Research & Informatics (IJERI)
E-ISSN: 2348-6481

COPYRIGHT NOTICE: © 2014–2025. All rights reserved to IJERI. No part of this publication may be reproduced, stored, or transmitted in any form or by any means without prior written permission from the Publisher. Authorization to photocopy items for internal and personal use by subscribers is granted by the copyright holder. This consent does not extend to other kinds of copying such as reproduction for general distribution, resale, or use in derivative works.

DISCLAIMER: The Publisher and the Editorial Board of IJERI shall not be held responsible for any errors, inaccuracies, or consequences arising from the use of information contained in this journal. The views and opinions expressed in published articles are solely those of the respective authors and do not necessarily reflect the official policy or position of the Publisher or Editors.