Open Access iconOpen Access

ARTICLE

crossmark

Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

by Junjie Zhou, Hongkui Xu*, Zifeng Zhang, Jiangkun Lu, Wentao Guo, Zhenye Li

School of Information and Electrical Engineering, Shandong Jianzhu University, Jinan, 250000, China

* Corresponding Author: Hongkui Xu. Email: email

Computer Systems Science and Engineering 2023, 46(2), 2277-2297. https://doi.org/10.32604/csse.2023.036419

Abstract

Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or a simple network combination cannot obtain rich characteristic knowledge of fraudulent phone texts relatively. Therefore, a new model is proposed in this paper. In the fraudulent phone text, the knowledge that can be learned by the model includes the sequence structure of sentences, the correlation between words, the correlation of contextual semantics, the feature of keywords in sentences, etc. The new model combines a bidirectional Long-Short Term Memory Neural Network (BiLSTM) or a bidirectional Gate Recurrent United (BiGRU) and a Multi-Head attention mechanism module with convolution. A normalization layer is added after the output of the final hidden layer. BiLSTM or BiGRU is used to build the encoding and decoding layer. Multi-head attention mechanism module with convolution (MHAC) enhances the ability of the model to learn global interaction information and multi-granularity local interaction information in fraudulent sentences. A fraudulent phone text dataset is produced by us in this paper. The THUCNews data sets and fraudulent phone text data sets are used in experiments. Experiment results show that compared with the baseline model, the proposed model (LMHACL) has the best experiment results in terms of Accuracy, Precision, Recall, and F1 score on the two data sets. And the performance indexes on fraudulent phone text data sets are all above 0.94.

Keywords


Cite This Article

APA Style
Zhou, J., Xu, H., Zhang, Z., Lu, J., Guo, W. et al. (2023). Using recurrent neural network structure and multi-head attention with convolution for fraudulent phone text recognition. Computer Systems Science and Engineering, 46(2), 2277-2297. https://doi.org/10.32604/csse.2023.036419
Vancouver Style
Zhou J, Xu H, Zhang Z, Lu J, Guo W, Li Z. Using recurrent neural network structure and multi-head attention with convolution for fraudulent phone text recognition. Comput Syst Sci Eng. 2023;46(2):2277-2297 https://doi.org/10.32604/csse.2023.036419
IEEE Style
J. Zhou, H. Xu, Z. Zhang, J. Lu, W. Guo, and Z. Li, “Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition,” Comput. Syst. Sci. Eng., vol. 46, no. 2, pp. 2277-2297, 2023. https://doi.org/10.32604/csse.2023.036419



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 776

    View

  • 498

    Download

  • 0

    Like

Share Link