Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.3

Submission
Last date
28-Jun-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  Spam Call Protection Using Machine Learning
PaperId: :  25006
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 10 Issue 5 2024
DUI:    16.0415/IJARIIE-25006
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
AKASH SCMR University
DR N PughazendiCMR University

Abstract

Telecommunication security
Robocalling ,Spam calls,Fraudulent calls,Telecommunication networks,Machine learning (ML),Supervised learning,Unsupervised learning,Reinforcement learning,Call metadata,Decision trees,Support Vector Machines (SVM),Deep neural networks,Clustering,Anomaly detection,Natural Language Processing (NLP),Voice spam,Real-time data analytics,False positives,Data privacy,Model updates,Cloud deployment,Spam call protection,Ethical considerations
Robocalling has turned into a Public Enemy No. 1 in the world of telecommunications, costing billions, reducing efficiency and violating privacy. Spam and fraudulent calls are increasing significantly with the expansion of telecommunication networks worldwide, triggering a need for methods that respond adequately to this challenge. In the past, over and above spam calls and brute force attempts at cracking passcodes, traditional types of telemarketing campaign such as blacklisted spam call protection mechanisms, rule-based filtering etc., made short work of banning numbers that violated the auto dialer rules. This is where Machine Learning (ML) shines, using sophisticated algorithms that enable the software to analyse data and learn from it, identify patterns and make decisions. In this paper, we will study the spam call detection and protection problem using machine learning models and various practical challenges and surgeries offered by this new solution. In particular, we cover supervised and unsupervised and reinforcement learning techniques that telecommunication network providers can use to sieve out spam calls. The spam and legitimate calls are classified using supervised learning models like decision trees, SVM, or deep neural networks which is trained on the call metadata (e.g. call frequency, duration, origin) on huge datasets. There are methods like unsupervised learning too, for example clustering or anomaly detection algorithms which make use of the data patterns and abnormality for providing an additional layer of protection invisibly without labels. We also consider how Natural Language Processing (NLP) can provide assistance with the identification of robocalls and voice spam based on patterns in speech and text. By deploying ML models on the cloud for real-time data analytics this is scalable to protect from spam calls. The key challenges discussed were the potential for false positives, data privacy risks, and ongoing requirements for model updates in order to prevent new types of spam. In conclusion, machine learning shows great potential for transforming the spam call protection space but it can only deliver on its promises with a deep robust model design, comprehensive datasets that adequately represent the entire spectrum of users and ethical considerations.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE AKASH S, and DR N Pughazendi. "Spam Call Protection Using Machine Learning" International Journal Of Advance Research And Innovative Ideas In Education Volume 10 Issue 5 2024 Page 708-712
MLA AKASH S, and DR N Pughazendi. "Spam Call Protection Using Machine Learning." International Journal Of Advance Research And Innovative Ideas In Education 10.5(2024) : 708-712.
APA AKASH S, & DR N Pughazendi. (2024). Spam Call Protection Using Machine Learning. International Journal Of Advance Research And Innovative Ideas In Education, 10(5), 708-712.
Chicago AKASH S, and DR N Pughazendi. "Spam Call Protection Using Machine Learning." International Journal Of Advance Research And Innovative Ideas In Education 10, no. 5 (2024) : 708-712.
Oxford AKASH S, and DR N Pughazendi. 'Spam Call Protection Using Machine Learning', International Journal Of Advance Research And Innovative Ideas In Education, vol. 10, no. 5, 2024, p. 708-712. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/Spam_Call_Protection_Using_Machine_Learning_ijariie25006.pdf (Accessed : ).
Harvard AKASH S, and DR N Pughazendi. (2024) 'Spam Call Protection Using Machine Learning', International Journal Of Advance Research And Innovative Ideas In Education, 10(5), pp. 708-712IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/Spam_Call_Protection_Using_Machine_Learning_ijariie25006.pdf (Accessed : )
IEEE AKASH S, and DR N Pughazendi, "Spam Call Protection Using Machine Learning," International Journal Of Advance Research And Innovative Ideas In Education, vol. 10, no. 5, pp. 708-712, Sep-Oct 2024. [Online]. Available: https://ijariie.com/AdminUploadPdf/Spam_Call_Protection_Using_Machine_Learning_ijariie25006.pdf [Accessed : ].
Turabian AKASH S, and DR N Pughazendi. "Spam Call Protection Using Machine Learning." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 10 number 5 ().
Vancouver AKASH S, and DR N Pughazendi. Spam Call Protection Using Machine Learning. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2024 [Cited : ]; 10(5) : 708-712. Available from: https://ijariie.com/AdminUploadPdf/Spam_Call_Protection_Using_Machine_Learning_ijariie25006.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
SINCAPY - A SEVERLESS THERAPHY CHATBOTComputer engineeringSrinithi G M Download
Two-Stage Image Denoising by Principal Component Analysis with Local Pixel Grouping.Information Communication EngineeringShaban Kassim Kilia Download
Spam Call Protection Using Machine LearningTelecommunication securityAKASH S Download
A Review on Alzheimer's Disease Detection using Different ApproachesComputer EngineeringVikash Kumar Download
Design of Microstrip multiband Triangular patch antenna using DGS technique at 6.5 GHzCommunication EngineeringV.Chinnari Download
ADVANCEMENT IN WIRELESS COMMUNICTIONS AND MOBILE COMPUTING-A COMPREHENSIVE REVIEWCOMPUTER G.TAMILSELVAN Download
TRANSFORMING PET BOTTLE INTO THREADElectronics and Communications EngineeringMulagala Dileep Download
EVALUATION OF AN ALGORITHM OF SOFTWARE DEFECTS OF UNDERSTANDABILITY USING A NEW METRICS OF SOFTWAREComputer EngineeringSamundra Singh Download
Securing the Connected Home: Addressing Challenges, Demands, Safeguards, and Emerging Patterns in Embedded IoT CybersecurityInformation TechnologyProf.Sir.Bashiru Aremu Download
Fleet Management for Route OptimizationCOMPUTER ENGINEERINGDEEPAK V Download
EXPERIMENTAL INVESTIGATION ON THE DESIGN OF MICROSTRIP ANTENNA ARRAY INTEGRATED WITH FILTERS FOR BODY AREA NETWORKSELECTRONICS AND COMMUNICATION ENGINEERINGABHINANTHAN S S Download
QUALITY OF SERVICE TRANSMISSION IN NETWORK LEVELScomputer EngineeringK. SREELATHA Download
Groundwater Level Prediction Using Multiple Machine Learning TechniquesComputer Engineering Kotari Jayanth Download
Medical Image Segmentation Assessmentcomputer applicationAnisha Sheikh Download
E-Healthcare Cloud Secure Fine-Grained Encrypted Keyword SearchMCAGhaininath suryavanshi Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.