作者
Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao
发表日期
2017/11/10
期刊
IEEE transactions on emerging topics in computing
卷号
8
期号
2
页码范围
313-327
出版商
IEEE
简介
Nuisance or unsolicited calls and instant messages come at any time in a variety of different ways. These calls would not only exasperate recipients with the unwanted ringing, impacting their productivity, but also lead to a direct financial loss to users and service providers. Telecommunication Service Providers (TSPs) often employ standalone detection systems to classify call originators as spammers or non-spammers using their behavioral patterns. These approaches perform well when spammers target a large number of recipients of one service provider. However, professional spammers try to evade the standalone systems by intelligently reducing the number of spam calls sent to one service provider, and instead distribute calls to the recipients of many service providers. Naturally, collaboration among service providers could provide an effective defense, but it brings the challenge of privacy protection and …
引用总数
20182019202020212022202320247834411
学术搜索中的文章