Mining Potential Spammers from Mobile Call Logs
With the rapid development of mobile telecommunication, voice call spam has become a growing problem in China. Many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. Nowadays,...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2015-04-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2015/143745 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849744373229551616 |
|---|---|
| author | Zhipeng Liu Dechang Pi Yunfang Chen |
| author_facet | Zhipeng Liu Dechang Pi Yunfang Chen |
| author_sort | Zhipeng Liu |
| collection | DOAJ |
| description | With the rapid development of mobile telecommunication, voice call spam has become a growing problem in China. Many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. Nowadays, the popular method for the task of mining call spammers has been performed by different applications on smartphones. These applications combine manual and automatic methods to detect spammers. Although the results of these client-based solutions are quite satisfying, it is extremely unfortunate that many people still use feature phones, which can not be equipped with third party applications. In this paper, we propose a server-based solution and take a call log file as an example, to analyze the characteristics of mobile call patterns. A time-based graph model and a simple and effective call log rank (CLRank) algorithm with ranking and classification were proposed to find potential call spammers. Compared with existing methods, our model just uses link information, and thus protects user privacy to the maximum extent. Experimental results show that our proposed model can find spammers from call logs automatically, dynamically, and effectively (with 84.5~91.8% of accuracy) without any manual interventions. |
| format | Article |
| id | doaj-art-a2776bbec2f545b59bce05edb73bd6d1 |
| institution | DOAJ |
| issn | 1550-1477 |
| language | English |
| publishDate | 2015-04-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-a2776bbec2f545b59bce05edb73bd6d12025-08-20T03:19:57ZengWileyInternational Journal of Distributed Sensor Networks1550-14772015-04-011110.1155/2015/143745143745Mining Potential Spammers from Mobile Call LogsZhipeng Liu0Dechang Pi1Yunfang Chen2 Department of Software Engineering, Nanjing University of Posts and Communications, Nanjing, Jiangsu 210003, China College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu 210016, China Department of Software Engineering, Nanjing University of Posts and Communications, Nanjing, Jiangsu 210003, ChinaWith the rapid development of mobile telecommunication, voice call spam has become a growing problem in China. Many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. Nowadays, the popular method for the task of mining call spammers has been performed by different applications on smartphones. These applications combine manual and automatic methods to detect spammers. Although the results of these client-based solutions are quite satisfying, it is extremely unfortunate that many people still use feature phones, which can not be equipped with third party applications. In this paper, we propose a server-based solution and take a call log file as an example, to analyze the characteristics of mobile call patterns. A time-based graph model and a simple and effective call log rank (CLRank) algorithm with ranking and classification were proposed to find potential call spammers. Compared with existing methods, our model just uses link information, and thus protects user privacy to the maximum extent. Experimental results show that our proposed model can find spammers from call logs automatically, dynamically, and effectively (with 84.5~91.8% of accuracy) without any manual interventions.https://doi.org/10.1155/2015/143745 |
| spellingShingle | Zhipeng Liu Dechang Pi Yunfang Chen Mining Potential Spammers from Mobile Call Logs International Journal of Distributed Sensor Networks |
| title | Mining Potential Spammers from Mobile Call Logs |
| title_full | Mining Potential Spammers from Mobile Call Logs |
| title_fullStr | Mining Potential Spammers from Mobile Call Logs |
| title_full_unstemmed | Mining Potential Spammers from Mobile Call Logs |
| title_short | Mining Potential Spammers from Mobile Call Logs |
| title_sort | mining potential spammers from mobile call logs |
| url | https://doi.org/10.1155/2015/143745 |
| work_keys_str_mv | AT zhipengliu miningpotentialspammersfrommobilecalllogs AT dechangpi miningpotentialspammersfrommobilecalllogs AT yunfangchen miningpotentialspammersfrommobilecalllogs |