Adversarial Attacks and Robustness in SMS Spam Classification Models

Authors

  • SAMPATH KUMAR N Senior Solution Delivery Lead, Deloitte USI Pvt Ltd, USA. Author

DOI:

https://doi.org/10.64137/31079458/IJCSEI-V2I1P103

Keywords:

SMS spam classification, Adversarial attacks, Model robustness, Natural language processing, Adversarial training, Text perturbation, Spam detection security

Abstract

Short Message Service (SMS) spam classification systems based on machine learning and deep learning have achieved high accuracy under standard evaluation settings; however, their vulnerability to adversarial attacks poses significant risks to real-world deployment. Attacks on SMS spam classifiers are realized as precision-level adversarial examples, where carefully crafted perturbations (e.g., character substitution/reordering, word disguising and synonym injection, benign token insertion) maintain human readability while drawing models to misclassify. In this paper, we study universal adversarial attacks on SMS spam clasification models and their adaptation to various feature representations and learning architectures: from classic machine learning models to deep neural networks and transformer-based solutions. And it introduces defense terms like adversarial training, data augmentation, ensemble learning, input sanitization and defensive distillation. Primary challenges such as trade-offs between robustness and accuracy, language diversity, and limited computation in mobile contexts are considered. The findings of the paper show possible future research challenges worth addressing for building robust SMS spam detection systems that are still performing effectively under adversarial conditions.

References

[1] B. Narra, D. V. K. R. Buddula, H. Patchipulusu, N. Vattikonda, A. Gupta, and A. R. Polu, “The Integration of Artificial Intelligence in Software Development: Trends, Tools, and Future Prospects,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5596472.

[2] A. K. Gupta et al., “Leveraging deep learning models for intrusion detection systems for secure networks,” Journal of Computer Science and Technology Studies, vol. 6, no. 2, pp. 199-208, 2024, doi: https://doi.org/10.32996/jcsts.2024.6.2.22

[3] R. P. Achuthananda et al., “Evaluating machine learning approaches for personalized movie recommendations: A comprehensive analysis,” Journal of Contemporary Education Theory & Artificial Intelligence, pp. 1-8, 2024.

[4] A. R. Polu et al., “Analyzing The Role of Analytics in Insurance Risk Management: A Systematic Review of Process Improvement and Business Agility,” IRJEMS International Research Journal of Economics and Management Studies, vol. 2, no. 3, pp. 325-332, 2025, Doi: https://doi.org/10.56472/25835238/IRJEMS-V2I1P142

[5] V. Tamilmani et al., “A Review of Cyber Threat Detection in Software-Defined and Virtualized Networking Infrastructures,” International Journal of Technology, Management and Humanities, vol. 10, no. 4, pp. 136-146, 2024, doi: https://doi.org/10.21590/ijtmh.10.04.15

[6] V. Bitkuri et al., “A Survey on Blockchain-Enabled ERP Systems for Secure Supply Chain Processes and Cloud Integration,” International Journal of Technology Management and Humanities, vol. 10, no. 02, pp. 52–65, Jun. 2024, doi: https://doi.org/10.21590/ijtmh.2024100209.

[7] Jaya Vardhani Mamidala et al., “Machine Learning Approaches to Salary Prediction in Human Resource Payroll Systems,” Journal of Computer Science and Technology Studies, vol. 7, no. 10, pp. 528–536, Oct. 2025, doi: https://doi.org/10.32996/jcsts.2025.7.10.52.

[8] P. Waditwar, “Reimagining procurement payments: From transactional bottlenecks to strategic value creation,” World Journal of Advanced Research and Reviews, vol. 28, no. 1, pp. 588–598, Oct. 2025, doi: https://doi.org/10.30574/wjarr.2025.28.1.3480.

[9] A. Attipalli et al., “Privacy Preservation in the Cloud: A Comprehensive Review of Encryption and Anonymization Methods,” International Journal of Multidisciplinary on Science and Management IJMSM, vol. 1, no. 1, pp. 35-44, 2024, doi: https://doi.org/10.71141/30485037/V1I1P106

[10] S. J. Enokkaren et al., “Artificial Intelligence (AI)-Based Advance Models for Proactive Payroll Fraud Detection and Prevention, International Journal of Machine Learning, AI & Data Science Evolution, vol. 1, no. 1, pp. 1-11, 2024, doi: https://doi.org/10.63665/ ijmlaidse-y1f1a001

[11] M. S. V. Tyagadurgam, “AI-Powered Cybersecurity Risk Scoring for Financial Institutions Using Machine Learning Techniques,” Journal of Artificial Intelligence & Cloud Computing, pp. 1–9, Dec. 2024, doi: https://doi.org/10.47363/jaicc/2024(3)452.

[12] P. Waditwar, “The Intersection of Strategic Sourcing and Artificial Intelligence: A Paradigm Shift for Modern Organizations,” Open Journal of Business and Management, vol. 12, no. 06, pp. 4073–4085, 2024, doi: https://doi.org/10.4236/ojbm.2024.126204.

[13] D. Rajendran, Venkata Deepak Namburi, Vetrivelan Tamilmani, A. Arjun, V. Maniar, and Rami Reddy Kothamaram, “Middleware Architectures for Hybrid and Multi-cloud Environments: A Survey of Scalability and Security Approaches,” Asian Journal of Research in Computer Science, vol. 19, no. 1, pp. 106–120, Jan. 2026, doi: https://doi.org/10.9734/ajrcos/2026/v19i1808.

[14] P. Waditwar, “De-Risking Returns: How AI Can Reinvent Big Tech’s China-Tied Reverse Supply Chains,” Open Journal of Business and Management, vol. 14, pp. 104-124, 2026, doi: 10.4236/ojbm.2026.141007

[15] V. Maniar, R. R. Kothamaram, D. Rajendran, V. D. Namburi, V. Tamilmani, and A. A. S. Singh, “A Comprehensive Survey on Digital Transformation and Technology Adoption Across Small and Medium Enterprises,” European Journal of Applied Science, Engineering and Technology, vol. 3, no. 6, pp. 238–250, Dec. 2025, doi: https://doi.org/10.59324/ejaset.2025.3(6).18.

[16] V. Tamilmani et al., “Automated Cloud Migration Pipelines: Trends, Tools, and Best Practices–A Survey,” Journal of Computer Science and Technology Studies, vol. 7, no. 11, pp. 121-134, 2025, doi: https://doi.org/10.32996/jcsts.2025.7.11.14

[17] A. Attipalli, R. Kendyala, J. Kurma, J. V. Mamidala, V. Bitkuri, and S. J. Enokkaren, “Survey on Evolution of Java Web Technologies and Best Practices: from Servlets to Microservices,” Asian Journal of Research in Computer Science, vol. 18, no. 11, pp. 172–187, Nov. 2025, doi: https://doi.org/10.9734/ajrcos/2025/v18i11786.

[18] Jaya Vardhani Mamidala et al., “Explainable Machine Learning Models for Malware Identification in Modern Computing Systems,” European Journal of Applied Science Engineering and Technology, vol. 3, no. 5, pp. 153–170, Oct. 2025, doi: https://doi.org/10.59324/ejaset.2025.3(5).13.

[19] Prajkta Waditwar, “AI-Driven Smart Negotiation Assistant for Procurement—An Intelligent Chatbot for Contract Negotiation Based on Market Data and AI Algorithms,” Journal of Data Analysis and Information Processing, vol. 13, no. 02, pp. 140–155, Jan. 2025, doi: https://doi.org/10.4236/jdaip.2025.132009.

[20] Raghuvaran Kendyala, Jagan Kurma, Jaya Vardhani Mamidala, Sunil Jacob Enokkaren, Avinash Attipalli, and Varun Bitkuri, “Framework based on Machine Learning for Lung Cancer Prognosis with Big Data-Driven,” European Journal of Technology, vol. 9, no. 1, pp. 68–85, Oct. 2025, doi: https://doi.org/10.47672/ejt.2787.

[21] A. B. Kakani, S. K. K. Nandiraju, S. K. Chundru, S. R. Vangala, R. M. Polam, and B. Kamarthapu, “Big Data and Predictive Analytics for Customer Retention: Exploring the Role of Machine Learning in E-Commerce,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515281.

[22] P. Kulkarni, T. Siddharth, S. Pillai, P. Pathak, V. N. Gangineni, and V. Yadav, “Cybersecurity Threats and Vulnerabilities - A Growing Challenge in Connected Vehicles,” Lecture Notes in Networks and Systems, pp. 466–476, Nov. 2025, doi: https://doi.org/10.1007/978-3-032-03558-5_39.

[23] N. R. Vanaparthi, “Intelligent Finance: How AI is Reshaping the Future of Financial Services,” International Journal of Computer Engineering and Technology, vol. 16, no. 1, pp. 126–137, Jan. 2025, doi: https://doi.org/10.34218/ijcet_16_01_012.

[24] M. Sai, Venkataswamy Naidu Gangineni, Sriram Pabbineedi, Ajay Babu Kakani, K. Kireeti, and Sandeep Kumar Chundru, “Preventing Phishing Attacks Using Advanced Deep Learning Techniques for Cyber Threat Mitigation,” Journal of Data Analysis and Information Processing, vol. 13, no. 03, pp. 314–330, Jan. 2025, doi: https://doi.org/10.4236/jdaip.2025.133020.

[25] M. Penmetsa, J. R. Bhumireddy, R. Chalasani, S. R. Vangala, R. M. Polam, and B. Kamarthapu, “Adversarial Machine Learning in Cybersecurity: A Review on Defending Against AI-Driven Attacks,” European Journal of Applied Science, Engineering and Technology, vol. 3, no. 4, pp. 4–14, Jun. 2025, doi: https://doi.org/10.59324/ejaset.2025.3(4).01

[26] Ram Mohan Polam, Bhavana Kamarthapu, Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, R. Chalasani, and Srikanth Reddy Vangala, “Advanced Machine Learning for Robust Botnet Attack Detection in Evolving Threat Landscapes,” Asian Journal of Research in Computer Science, vol. 18, no. 8, pp. 1–14, Aug. 2025, doi: https://doi.org/10.9734/ajrcos/2025/v18i8735.

[27] B. Kamarthapu, M. Penmetsa, J. R. Bhumireddy, R. Chalasani, S. R. Vangala, and R. M. Polam, “Data-Driven Detection of Network Threats using Advanced Machine Learning Techniques for Cybersecurity,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515400.

[28] M. Penmetsa, J. R. Bhumireddy, R. Chalasani, S. R. Vangala, R. M. Polam, and B. Kamarthapu, “Effectiveness of Deep Learning Algorithms in Phishing Attack Detection for Cybersecurity Frameworks,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515385.

[29] S. K. K. Nandiraju et al., “Towards Early Forecast of Diabetes Mellitus via Machine Learning Systems in Healthcare,” European Journal of Technology, vol. 9, no. 1, pp. 35-50, 2025.

[30] R. M. Polam, B. Kamarthapu, A. B. Kakani, S. K. K. Nandiraju, S. K. Chundru, and S. R. Vangala, “Predictive Modeling for Property Insurance Premium Estimation Using Machine Learning Algorithms,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515382.

[31] P. Waditwar, “Agentic AI and sustainable procurement: Rethinking anti-corrosion strategies in oil and gas,” World Journal of Advanced Research and Reviews, vol. 27, no. 3, pp. 1591–1598, Sep. 2025, doi: https://doi.org/10.30574/wjarr.2025.27.3.3298.

[32] R. Vadisetty et al., “Cyber Warfare and AI Agents: Strengthening National Security Against Advanced Persistent Threats (APTs),” International Conference on Intelligence-Based Transformations of Technology and Business Trends, Cham: Springer Nature Switzerland, pp. 578-587, 2025.

[33] S. K. Chundru, M. S. V. Tyagadurgam, V. N. Gangineni, S. Pabbineedi, A. B. Kakani, and S. K. K. Nandiraju, “Analyzing and Predicting Anaemia with Advanced Machine Learning Techniques with Comparative Analysis,” International Journal of Applied Information Systems, vol. 13, no. 1, pp. 28–36, Aug. 2025, doi: https://doi.org/10.5120/ijais2025452027.

[34] Ram Mohan Polam, Bhavana Kamarthapu, Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, R. Chalasani, and Srikanth Reddy Vangala, “Advanced Machine Learning for Robust Botnet Attack Detection in Evolving Threat Landscapes,” Asian Journal of Research in Computer Science, vol. 18, no. 8, pp. 1–14, Aug. 2025, doi: https://doi.org/10.9734/ajrcos/2025/v18i8735.

[35] B. Kamarthapu, M. Penmetsa, J. R. Bhumireddy, R. Chalasani, S. R. Vangala, and R. M. Polam, “Data-Driven Detection of Network Threats using Advanced Machine Learning Techniques for Cybersecurity,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515400.

[36] Narasimha Rao Vanaparthi, “Why digital transformation in fintech requires mainframe modernization: A cost-benefit analysis,” International Journal of Science and Research Archive, vol. 14, no. 1, pp. 1052–1062, Jan. 2025, doi: https://doi.org/10.30574/ijsra.2025.14.1.0161.

[37] Ajay Babu Kakani, K. Kireeti, Sandeep Kumar Chundru, Srikanth Reddy Vangala, Ram Mohan Polam, and Bhavana Kamarthapu, “Leveraging NLP and Sentiment Analysis for ML-Based Fake News Detection with Big Data,” SSRN Electronic Journal, Jan. 2025, doi: https://doi.org/10.2139/ssrn.5515418.

[38] Prajkta Waditwar, “Quantum-Enhanced Travel Procurement: Hybrid Quantum–Classical Optimization for Enterprise Travel Management,” World Journal of Advanced Engineering Technology and Sciences, vol. 17, no. 3, pp. 375–386, Dec. 2025, doi: https://doi.org/10.30574/wjaets.2025.17.3.1572.

[39] Narasimha Rao Vanaparthi, “REGULATORY COMPLIANCE IN THE DIGITAL AGE: HOW MAINFRAME MODERNIZATION CAN SUPPORT FINANCIAL INSTITUTIONS,” vol. 8, no. 1, pp. 383–396, Jan. 2025, doi: https://doi.org/10.34218/IJRCAIT_08_01_033.

[40] P. Waditwar, “AI-Driven Procurement in Ayurveda and Ayurvedic Medicines & Treatments,” Open Journal of Business and Management, vol. 13, no. 03, pp. 1854–1879, 2025, doi: https://doi.org/10.4236/ojbm.2025.133096.

[41] N. Rao, “The Roadmap to Mainframe Modernization: Bridging Legacy Systems with the Cloud,” International Journal of Scientific Research in Computer Science Engineering and Information Technology, vol. 11, no. 1, pp. 125–133, Jan. 2025, doi: https://doi.org/10.32628/cseit25111214.

[42] D. Prabakar, N. Iskandarova, N. Iskandarova, D. Kalla, K. Kulimova, and D. Parmar, “Dynamic Resource Allocation in Cloud Computing Environments Using Hybrid Swarm Intelligence Algorithms,” 2025 International Conference on Networks and Cryptology (NETCRYPT), pp. 882–886, May 2025, doi: https://doi.org/10.1109/netcrypt65877.2025.11102314

[43] Subuddi Nagaraju, Prashant Johri, Prakash Putta, D. Kalla, Sultonmakhmud Polvanov, and N. V. Patel, “Smart Routing in Urban Wireless Ad Hoc Networks Using Graph Attention Network-Based Decision Models,” pp. 212–216, May 2025, doi: https://doi.org/10.1109/netcrypt65877.2025.11102255

[44] D. Kalla, A. S. Mohammed, V. N. Boddapati, N. Jiwani, and T. Kiruthiga, “Investigating the Impact of Heuristic Algorithms on Cyberthreat Detection,” 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT), pp. 450–455, Nov. 2024, doi: https://doi.org/10.1109/icaiccit64383.2024.10912106.

[45] Rahul Vadisetty, Anand Polamarasetti, and D. Kalla, “Automated AI-Driven Phishing Detection and Countermeasures for Zero-Day Phishing Attacks,” Lecture notes in networks and systems, pp. 285–303, Jan. 2026, doi: https://doi.org/10.1007/978-981-96-8632-2_16.

[46] Preeti Nagrath, I. Saini, M. Zeeshan, Komal, Komal, and D. Kalla, “Predicting Mental Health Disorders with Variational Autoencoders,” Lecture notes in networks and systems, pp. 38–51, Oct. 2025, doi: https://doi.org/10.1007/978-3-032-03751-0_4.

[47] World Bank, Small and medium enterprises (SMEs) finance. World Bank Group, 2020. [Online]. Available; https://www.worldbank.org/en/topic/smefinance

[48] H. Zhai, M. Yang, and K. C. Chan, “Does digital transformation enhance a firm’s performance? Evidence from China,” Technology in Society, vol. 68, p. 101841, Feb. 2022, doi: https://doi.org/10.1016/j.techsoc.2021.101841.

[49] J. A. Restrepo-Morales, J. A. Ararat-Herrera, D. A. López-Cadavid, and A. Camacho-Vargas, “Breaking the digitalization barrier for SMEs: a fuzzy logic approach to overcoming challenges in business transformation,” Journal of Innovation and Entrepreneurship, vol. 13, no. 1, Nov. 2024, doi: https://doi.org/10.1186/s13731-024-00429-w.

Downloads

Published

2026-01-24

Issue

Section

Articles

How to Cite

Adversarial Attacks and Robustness in SMS Spam Classification Models. (2026). International Journal of Computer Science and Engineering Innovations, 2(1), 17-24. https://doi.org/10.64137/31079458/IJCSEI-V2I1P103