2018
DOI: 10.1007/978-981-13-0212-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Text Message Classification Using Supervised Machine Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 32 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…These integrations could improve model performance and adaptability, particularly to address evolving malware threats. Furthermore, exploring ensemble techniques, transfer learning approaches, or other ML approaches tested in different fields could be valuable in improving model generalization and scalability [15][16][17][18]. These avenues offer promising directions for extending the capabilities and robustness of malware detection systems.…”
Section: Accuracymentioning
confidence: 99%
“…These integrations could improve model performance and adaptability, particularly to address evolving malware threats. Furthermore, exploring ensemble techniques, transfer learning approaches, or other ML approaches tested in different fields could be valuable in improving model generalization and scalability [15][16][17][18]. These avenues offer promising directions for extending the capabilities and robustness of malware detection systems.…”
Section: Accuracymentioning
confidence: 99%
“…The major drawback of the system is Global positioning system (GPS), the user position information will be investigated in the future. Piyush Chanana, Rohan Paul, M Balakrishnan and PVM Rao [9] made a comprehensive study on various assistive technology solutions available for Visually Impaired people and the study revealed that most of the assistive technologies already present provide limited solutions to the user needs. Most of them focused on technology and not on user needs.…”
Section: Portable Electronic Travel Toolsmentioning
confidence: 99%
“…But, the accuracy is not enhanced and the training time is too minimized. Supervised technique [11,25] provides various resources that help the research into the automating IoT-oriented cyber-attack detection and the malicious…”
Section: Problem Statementmentioning
confidence: 99%