AI-Driven Solutions for Detecting and Blocking Unwanted Messages on User Walls

Authors

  • Arrenholz Grace Abigail USA Author

Keywords:

phishing attempts, AI-driven solutions

Abstract

In the digital age, social media platforms have become a critical medium for communication and information sharing. However, the proliferation of unsolicited messages, including spam, phishing attempts, and other unwanted content, poses significant challenges to user experience and privacy. This paper explores AI-driven solutions for detecting and blocking unwanted messages on user walls. We present a comprehensive framework that leverages machine learning algorithms, natural language processing (NLP), and real-time data analysis to identify and filter out undesirable content. The proposed system utilizes supervised learning techniques to train models on labeled datasets, enabling the accurate detection of spam and other malicious messages. Additionally, we integrate deep learning methods to enhance the system's ability to understand context and semantics, further improving its filtering capabilities. Our approach not only aims to safeguard users from potential threats but also enhances the overall user experience by reducing clutter and maintaining a clean communication environment. The efficacy of the system is evaluated through extensive experiments and real-world case studies, demonstrating its robustness and reliability in diverse scenarios. The findings suggest that AI-driven solutions are effective and scalable for maintaining the integrity of user walls in social media environments.

References

Aggarwal, C. C., & Zhai, C. (2012). Mining Text Data. Springer Science & Business Media.

Chandrasekaran, M., Narayanan, K., & Upadhyaya, S. (2006). Phishing email detection based on structural properties. In Proceedings of the 9th Annual New York State Cyber Security Conference (pp. 1-7).

Guzella, T. S., & Caminhas, W. M. (2009). A review of machine learning approaches to spam filtering. Expert Systems with Applications, 36(7), 10206-10222.

Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural computation, 9(8), 1735-1780.

Manning, C. D., Raghavan, P., & Schütze, H. (2008). Introduction to Information Retrieval. Cambridge University Press.

Rao, J. M., & Reiley, D. H. (2012). The economics of spam. Journal of Economic Perspectives, 26(3), 87-110.

Published

2014-01-18

How to Cite

AI-Driven Solutions for Detecting and Blocking Unwanted Messages on User Walls. (2014). JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 2(1), 1-9. https://jrtcse.com/index.php/home/article/view/JRTCSE.2014.1.1