Ensemble Learning Methods for Improving SMS Spam Classification Accuracy

Authors

  • EZEKIEL NYONG University of Ibadan, Nigeria. Author

DOI:

https://doi.org/10.64137/31079458/IJCSEI-V2I1P104

Keywords:

SMS spam classification, Ensemble learning, Bagging, Boosting, Stacking, Voting classifiers, Machine learning, Text classification, Natural language processing, Spam detection

Abstract

SMS spam classification remains a critical challenge due to the short length, informal structure, and high variability of text messages. The performance of single machine learning and deep learning models is promising; however, the class imbalance problem, overfitting issue, and poor generalization across datasets frequently occur. In this paper, we investigate how ensemble learning can enhance the peak performance and stability in SMS spam filtering. Several ensemble models (bagging, boosting, stacking and voting based) are examined using heterogeneous base learners such as Naïve Bayes, Support Vector Machines, Random Forests or neural network models. The experimental results on benchmark SMS spam datasets show that the ensemble models consistently achieve higher performance compared with single classifiers in different measures, including accuracy, precision, recall and F1-score. The results demonstrate the advantages of ensemble learning in learning complementary decision boundaries and mitigating model bias and variance. The present work demonstrates the promise of ensemble methods for the development of trustworthy, scalable SMS spam filters to be efficiently applied in a production environment.

References

[1] B. Narra, V. Kumar, Hari, Navya Vattikonda, A. K. Gupta, and Achuthananda Reddy Polu, “The Integration of Artificial Intelligence in Software Development: Trends, Tools, and Future Prospects,” Zenodo (CERN European Organization for Nuclear Research), Apr. 2024, doi: https://doi.org/10.5281/zenodo.17099155

[2] A. K. Gupta., “Leveraging deep learning models for intrusion detection systems for secure networks,” Journal of Computer Science and Technology Studies, vol. 6, no. 2, pp. 199-208, 2024. Doi: https://doi.org/10.32996/jcsts.2024.6.2.22

[3] R. P. Achuthananda et al., “Evaluating machine learning approaches for personalized movie recommendations: A comprehensive analysis,” Journal of Contemporary Education Theory & Artificial Intelligence, pp. 1-8, 2024.

[4] A. Reddy Polu et al., “Analyzing The Role of Analytics in Insurance Risk Management: A Systematic Review of Process Improvement and Business Agility,” IJASTR-International Journal of Applied Science and Technical Research, vol. 1, no. 1, 2024, doi: https://doi.org/10.5281/zenodo.15209484.

[5] V. Tamilmani et al., “A Review of Cyber Threat Detection in Software-Defined and Virtualized Networking Infrastructures,” International Journal of Technology, Management and Humanities, vol. 10, no. 4, pp. 136-146, 2024. Doi: https://doi.org/10.21590/ijtmh.10.04.15

[6] R. R. Kothamaram, “Predictive Analytics for Customer Retention in Telecommunications Using ML Techniques,” vol. 1, no.1, pp. 45-58, 2024. Doi: https://doi.org/10.71141/30485037/V1I1P107

[7] A. A. S. Singh et al., “A Review on Model-Driven Development with a Focus on Microsoft PowerApps,” International Journal of Humanities Science Innovations and Management Studies, vol. 1, no. 1, pp. 43-56, 2024. Doi: https://doi.org/10.64137/30508509/IJHSIMS-V1I1P105

[8] None Varun Bitkuri, None Raghuvaran Kendyala, None Jagan Kurma, N. Jaya, None Avinash Attipalli, and J. Enokkaren, “A Survey on Blockchain-Enabled ERP Systems for Secure Supply Chain Processes and Cloud Integration,” International Journal of Technology Management and Humanities, vol. 10, no. 02, pp. 52–65, Jun. 2024, doi: https://doi.org/10.21590/ijtmh.2024100209.

[9] P. Waditwar, “AI for Bathsheba Syndrome: Ethical Implications and Preventative Strategies,” Open Journal of Leadership, vol. 13, no. 03, pp. 321–341, 2024, doi: https://doi.org/10.4236/ojl.2024.133020.

[10] Jaya Vardhani Mamidala et al., “Machine Learning Approaches to Salary Prediction in Human Resource Payroll Systems,” Journal of Computer Science and Technology Studies, vol. 7, no. 10, pp. 528–536, Oct. 2025, doi: https://doi.org/10.32996/jcsts.2025.7.10.52.

[11] Prajkta Waditwar, “Reimagining procurement payments: From transactional bottlenecks to strategic value creation,” World Journal of Advanced Research and Reviews, vol. 28, no. 1, 588-598, 2025, doi: https://doi.org/10.30574/wjarr.2025.28.1.3480.

[12] J. Enokkaren, “Privacy Preservation in the Cloud: A Comprehensive Review of Encryption and Anonymization Methods,” International Journal of Multidisciplinary on Science and Management, vol. 1, no. 1, pp. 35-44, 2024, doi: https://doi.org/ 10.71141/30485037/V1I1P106

[13] S. J. Enokkaren et al., “Artificial Intelligence (AI)-Based Advance Models for Proactive Payroll Fraud Detection and Prevention,” International Journal of Machine Learning, AI & Data Science Evolution. Vol. 1, no. 1, pp. 1-11, 2024.

[14] M. S. V. Tyagadurgam, “AI-Powered Cybersecurity Risk Scoring for Financial Institutions Using Machine Learning Techniques,” Journal of Artificial Intelligence & Cloud Computing, pp. 1–9, Dec. 2024, doi: https://doi.org/10.47363/jaicc/2024(3)452.

[15] P. Waditwar, “The Intersection of Strategic Sourcing and Artificial Intelligence: A Paradigm Shift for Modern Organizations,” Open Journal of Business and Management, vol. 12, no. 06, pp. 4073–4085, 2024, doi: https://doi.org/10.4236/ojbm.2024.126204.

[16] D. Rajendran, Venkata Deepak Namburi, Vetrivelan Tamilmani, A. Arjun, V. Maniar, and Rami Reddy Kothamaram, “Middleware Architectures for Hybrid and Multi-cloud Environments: A Survey of Scalability and Security Approaches,” Asian Journal of Research in Computer Science, vol. 19, no. 1, pp. 106–120, Jan. 2026, doi: https://doi.org/10.9734/ajrcos/2026/v19i1808.

[17] “De-Risking Returns: How AI Can Reinvent Big Tech’s China-Tied Reverse Supply Chains,” Scirp.org, 2026. https://www.scirp.org/journal/papercitationdetails?paperid=148354&JournalID=2447 (accessed Feb. 07, 2026).

[18] V. Maniar, R. R. Kothamaram, D. Rajendran, V. D. Namburi, V. Tamilmani, and A. A. S. Singh, “A Comprehensive Survey on Digital Transformation and Technology Adoption Across Small and Medium Enterprises,” European Journal of Applied Science, Engineering and Technology, vol. 3, no. 6, pp. 238–250, Dec. 2025, doi: https://doi.org/10.59324/ejaset.2025.3(6).18.

[19] Vetrivelan Tamilmani, V. Maniar, A. Arjun, Rami Reddy Kothamaram, D. Rajendran, and Venkata Deepak Namburi, “Automated Cloud Migration Pipelines: Trends, Tools, and Best Practices – A Survey,” Journal of Computer Science and Technology Studies, vol. 7, no. 11, pp. 121–134, 2025, doi: https://doi.org/10.32996/jcsts.2025.7.11.14.

[20] A. Attipalli, R. Kendyala, J. Kurma, J. V. Mamidala, V. Bitkuri, and S. J. Enokkaren, “Survey on Evolution of Java Web Technologies and Best Practices: from Servlets to Microservices,” Asian Journal of Research in Computer Science, vol. 18, no. 11, pp. 172–187, Nov. 2025, doi: https://doi.org/10.9734/ajrcos/2025/v18i11786.

[21] Jaya Vardhani Mamidala et al., “Explainable Machine Learning Models for Malware Identification in Modern Computing Systems,” European Journal of Applied Science Engineering and Technology, vol. 3, no. 5, pp. 153–170, Oct. 2025, doi: https://doi.org/10.59324/ejaset.2025.3(5).13.

[22] Prajkta Waditwar, “AI-Driven Smart Negotiation Assistant for Procurement—An Intelligent Chatbot for Contract Negotiation Based on Market Data and AI Algorithms,” Journal of Data Analysis and Information Processing, vol. 13, no. 02, pp. 140–155, Jan. 2025, doi: https://doi.org/10.4236/jdaip.2025.132009.

[23] Raghuvaran Kendyala, Jagan Kurma, Jaya Vardhani Mamidala, Sunil Jacob Enokkaren, Avinash Attipalli, and Varun Bitkuri, “Framework based on Machine Learning for Lung Cancer Prognosis with Big Data-Driven,” European Journal of Technology, vol. 9, no. 1, pp. 68–85, Oct. 2025, doi: https://doi.org/10.47672/ejt.2787.

[24] A. B. Kakani, S. K. K. Nandiraju, S. K. Chundru, S. R. Vangala, R. M. Polam, and B. Kamarthapu, “Big Data and Predictive Analytics for Customer Retention: Exploring the Role of Machine Learning in E-Commerce,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515281.

[25] P. Kulkarni, T. Siddharth, S. Pillai, P. Pathak, V. N. Gangineni, and V. Yadav, “Cybersecurity Threats and Vulnerabilities - A Growing Challenge in Connected Vehicles,” Lecture Notes in Networks and Systems, pp. 466–476, Nov. 2025, doi: https://doi.org/10.1007/978-3-032-03558-5_39.

[26] N. R. Vanaparthi, “INTELLIGENT FINANCE: HOW AI IS RESHAPING THE FUTURE OF FINANCIAL SERVICES,” INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, vol. 16, no. 1, pp. 126–137, Jan. 2025, doi: https://doi.org/10.34218/ijcet_16_01_012.

[27] M. Sai, Venkataswamy Naidu Gangineni, Sriram Pabbineedi, Ajay Babu Kakani, K. Kireeti, and Sandeep Kumar Chundru, “Preventing Phishing Attacks Using Advanced Deep Learning Techniques for Cyber Threat Mitigation,” Journal of Data Analysis and Information Processing, vol. 13, no. 03, pp. 314–330, Jan. 2025, doi: https://doi.org/10.4236/jdaip.2025.133020.

[28] M. Penmetsa, J. R. Bhumireddy, R. Chalasani, S. R. Vangala, R. M. Polam, and B. Kamarthapu, “Adversarial Machine Learning in Cybersecurity: A Review on Defending Against AI-Driven Attacks,” European Journal of Applied Science, Engineering and Technology, vol. 3, no. 4, pp. 4–14, Jun. 2025, doi: https://doi.org/10.59324/ejaset.2025.3(4).01.

[29] Ram Mohan Polam, Bhavana Kamarthapu, Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, R. Chalasani, and Srikanth Reddy Vangala, “Advanced Machine Learning for Robust Botnet Attack Detection in Evolving Threat Landscapes,” Asian Journal of Research in Computer Science, vol. 18, no. 8, pp. 1–14, Aug. 2025, doi: https://doi.org/10.9734/ajrcos/2025/v18i8735.

[30] Bhavana Kamarthapu, Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, R. Chalasani, Srikanth Reddy Vangala, and Ram Mohan Polam, “Data-Driven Detection of Network Threats Using Advanced Machine Learning Techniques for Cybersecurity,” International Journal of Applied Information Systems, vol. 13, no. 1, pp. 37–44, Aug. 2025, doi: https://doi.org/10.5120/ijais2025452028.

[31] M. Penmetsa, J. R. Bhumireddy, R. Chalasani, S. R. Vangala, R. M. Polam, and B. Kamarthapu, “Effectiveness of Deep Learning Algorithms in Phishing Attack Detection for Cybersecurity Frameworks,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515385.

[32] Nandiraju Nandiraju, Sandeep Kumar Chundru, Srikanth Reddy Vangala, Ram Mohan Polam, Bhavana Kamarthapu, and Kakani Kakani, “Towards Early Forecast of Diabetes Mellitus via Machine Learning Systems in Healthcare,” European Journal of Technology, vol. 9, no. 1, pp. 35–50, 2025, doi: https://doi.org/10.47672/ejt.2729.

[33] R. M. Polam, B. Kamarthapu, A. B. Kakani, S. K. K. Nandiraju, S. K. Chundru, and S. R. Vangala, “Predictive Modeling for Property Insurance Premium Estimation Using Machine Learning Algorithms,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515382.

[34] S. K. K. Nandiraju, S. K. Chundru, M. S. V. Tyagadurgam, V. N. Gangineni, S. Pabbineedi, and A. B. Kakani, “Enhancing Cybersecurity: Zero-Day Attack Detection in Network Traffic with Deep Learning Model,” Asian Journal of Research in Computer Science, vol. 18, no. 7, pp. 262–273, Aug. 2025, doi: https://doi.org/10.9734/ajrcos/2025/v18i7734.

[35] P. Waditwar, “Agentic AI and sustainable procurement: Rethinking anti-corrosion strategies in oil and gas,” World Journal of Advanced Research and Reviews, vol. 27, no. 3, pp. 1591–1598, Sep. 2025, doi: https://doi.org/10.30574/wjarr.2025.27.3.3298.

[36] Rahul Vadisetty, Anand Polamarasetti, V. Varadarajan, D. Kalla, and G. K. Ramanathan, “Cyber Warfare and AI Agents: Strengthening National Security Against Advanced Persistent Threats (APTs),” Communications in computer and information science, pp. 578–587, Oct. 2025, doi: https://doi.org/10.1007/978-3-032-07373-0_43.

[37] S. K. Chundru, M. S. V. Tyagadurgam, V. N. Gangineni, S. Pabbineedi, A. B. Kakani, and S. K. K. Nandiraju, “Analyzing and Predicting Anaemia with Advanced Machine Learning Techniques with Comparative Analysis,” International Journal of Applied Information Systems, vol. 13, no. 1, pp. 28–36, Aug. 2025, doi: https://doi.org/10.5120/ijais2025452027.

[38] R. M. Polam, B. Kamarthapu, M. Penmetsa, J. R. Bhumireddy, R. Chalasani, and S. R. Vangala, “Advanced Machine Learning for Robust Botnet Attack Detection in Evolving Threat Landscapes,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515384.

[39] Bhavana Kamarthapu, Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, R. Chalasani, Srikanth Reddy Vangala, and Ram Mohan Polam, “Data-Driven Detection of Network Threats Using Advanced Machine Learning Techniques for Cybersecurity,” International Journal of Applied Information Systems, vol. 13, no. 1, pp. 37–44, Aug. 2025, doi: https://doi.org/10.5120/ijais2025452028.

[40] M. Penmetsa, J. R. Bhumireddy, R. Chalasani, S. R. Vangala, R. M. Polam, and B. Kamarthapu, “Effectiveness of Deep Learning Algorithms in Phishing Attack Detection for Cybersecurity Frameworks,” SSRN Electronic Journal, 2025, doi: https://doi.org/10.2139/ssrn.5515385.

[41] Narasimha Rao Vanaparthi, “Why digital transformation in fintech requires mainframe modernization: A cost-benefit analysis,” International Journal of Science and Research Archive, vol. 14, no. 1, pp. 1052–1062, Jan. 2025, doi: https://doi.org/10.30574/ijsra.2025.14.1.0161.

[42] Ajay Babu Kakani, K. Kireeti, Sandeep Kumar Chundru, Srikanth Reddy Vangala, Ram Mohan Polam, and Bhavana Kamarthapu, “Leveraging NLP and Sentiment Analysis for ML-Based Fake News Detection with Big Data,” SSRN Electronic Journal, Jan. 2025, doi: https://doi.org/10.2139/ssrn.5515418.

[43] Prajkta Waditwar, “Quantum-Enhanced Travel Procurement: Hybrid Quantum–Classical Optimization for Enterprise Travel Management,” World Journal of Advanced Engineering Technology and Sciences, vol. 17, no. 3, pp. 375–386, Dec. 2025, doi: https://doi.org/10.30574/wjaets.2025.17.3.1572.

[44] Narasimha Rao Vanaparthi, “REGULATORY COMPLIANCE IN THE DIGITAL AGE: HOW MAINFRAME MODERNIZATION CAN SUPPORT FINANCIAL INSTITUTIONS,” vol. 8, no. 1, pp. 383–396, Jan. 2025, doi: https://doi.org/10.34218/IJRCAIT_08_01_033.

[45] P. Waditwar, “AI-Driven Procurement in Ayurveda and Ayurvedic Medicines & Treatments,” Open Journal of Business and Management, vol. 13, no. 03, pp. 1854–1879, 2025, doi: https://doi.org/10.4236/ojbm.2025.133096.

[46] N. Rao, “The Roadmap to Mainframe Modernization: Bridging Legacy Systems with the Cloud,” International Journal of Scientific Research in Computer Science Engineering and Information Technology, vol. 11, no. 1, pp. 125–133, Jan. 2025, doi: https://doi.org/10.32628/cseit25111214.

[47] D. Prabakar, N. Iskandarova, N. Iskandarova, D. Kalla, K. Kulimova, and D. Parmar, “Dynamic Resource Allocation in Cloud Computing Environments Using Hybrid Swarm Intelligence Algorithms,” 2025 International Conference on Networks and Cryptology (NETCRYPT), pp. 882–886, May 2025, doi: https://doi.org/10.1109/netcrypt65877.2025.11102314.

[48] Subuddi Nagaraju, Prashant Johri, Prakash Putta, D. Kalla, Sultonmakhmud Polvanov, and N. V. Patel, “Smart Routing in Urban Wireless Ad Hoc Networks Using Graph Attention Network-Based Decision Models,” pp. 212–216, May 2025, doi: https://doi.org/10.1109/netcrypt65877.2025.11102255.

[49] D. Kalla, A. S. Mohammed, V. N. Boddapati, N. Jiwani, and T. Kiruthiga, “Investigating the Impact of Heuristic Algorithms on Cyberthreat Detection,” 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT), pp. 450–455, Nov. 2024, doi: https://doi.org/10.1109/icaiccit64383.2024.10912106.

[50] Rahul Vadisetty, Anand Polamarasetti, and D. Kalla, “Automated AI-Driven Phishing Detection and Countermeasures for Zero-Day Phishing Attacks,” Lecture notes in networks and systems, pp. 285–303, Jan. 2026, doi: https://doi.org/10.1007/978-981-96-8632-2_16.

[51] Preeti Nagrath, I. Saini, M. Zeeshan, Komal, Komal, and D. Kalla, “Predicting Mental Health Disorders with Variational Autoencoders,” Lecture notes in networks and systems, pp. 38–51, Oct. 2025, doi: https://doi.org/10.1007/978-3-032-03751-0_4.

[52] World Bank, Small and medium enterprises (SMEs) finance, World Bank Group, 2020. [Online]. Available: https://www.worldbank.org/en/topic/smefinance

[53] Zhai, H., Yang, M., Chan, K. C., & Li, S. (2022). Does digital transformation enhance firm performance? Evidence from SMEs. Technological Forecasting and Social Change, 174, 121284.

[54] Zaenal Aripin, B. Susanto, and R. Agusiady, “DIGITAL TRANSFORMATION IN INDONESIAN SMES: DRIVERS, BARRIERS, AND PERFORMANCE OUTCOMES,” Journal of Economics, Accounting, Business, Management, Engineering and Society, vol. 1, no. 11, pp. 1–8, 2024, Accessed: Feb. 07, 2026. [Online]. Available: https://kisainstitute.com/index.php/kisainstitute/article/view/43

[55] J. A. Restrepo-Morales, J. A. Ararat-Herrera, D. A. López-Cadavid, and A. Camacho-Vargas, “Breaking the digitalization barrier for SMEs: a fuzzy logic approach to overcoming challenges in business transformation,” Journal of Innovation and Entrepreneurship, vol. 13, no. 1, Nov. 2024, doi: https://doi.org/10.1186/s13731-024-00429-w.

[56] G. H. Sagala and D. Őri, “Toward SMEs digital transformation success: a systematic literature review,” Information Systems and e-Business Management, vol. 22, Jul. 2024, doi: https://doi.org/10.1007/s10257-024-00682-2.

[57] OECD, “The Digital Transformation of SMEs,” OECD, Feb. 03, 2021. https://www.oecd.org/en/publications/the-digital-transformation-of-smes_bdb9256a-en.html

[58] T. Yuwono, A. Suroso, and W. Novandari, “Information and communication technology in SMEs: a systematic literature review,” Journal of innovation and entrepreneurship, vol. 13, no. 1, May 2024, doi: https://doi.org/10.1186/s13731-024-00392-6.

[59] T. Justy, E. Pellegrin-Boucher, D. Lescop, J. Granata, and S. Gupta, “On the edge of Big Data: Drivers and barriers to data analytics adoption in SMEs,” Technovation, vol. 127, p. 102850, Sep. 2023, doi: https://doi.org/10.1016/j.technovation.2023.102850.

[60] Saleh Alarifi, “SMEs’ Resilience Toward Cyberattacks in Saudi Arabia: A Review Paper,” International Journal of Scientific Research and Management (IJSRM), vol. 13, no. 12, pp. 10162–10175, Jan. 2025, doi: https://doi.org/10.18535/ijsrm/v13i12.em13.

[61] G. B. Thapa and Dr. S. Thapaliya, “Cybersecurity Challenges in Small and Medium Enterprises (SMES) in Nepal,” International Journal of Multidisciplinary and Innovative Research, vol. 02, no. 06, Jun. 2025, doi: https://doi.org/10.58806/ijmir.2025.v2i6n05.

[62] S. Chaudhary, Vasileios Gkioulos, and D. W. Goodman, “Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources,” Lecture Notes in Computer Science, pp. 97–115, Jan. 2023, doi: https://doi.org/10.1007/978-3-031-25460-4_6.

[63] M. Wallang, M. D. K. Shariffuddin, and M. Mokhtar, “CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES (SMEs),” Journal of Governance and Development (JGD), vol. 18, no. 1, pp. 75–87, Dec. 2022, doi: https://doi.org/10.32890/jgd2022.18.1.5.

[64] Carlos Rombaldo Junior, I. Becker, and S. D. Johnson, “Unaware, Unfunded and Uneducated: A Systematic Review of SME Cybersecurity,” arXiv (Cornell University), Sep. 2023, doi: https://doi.org/10.48550/arxiv.2309.17186.

[65] A. Chidukwani, S. Zander, and P. Koutsakis, “Cybersecurity Preparedness of Small-to-Medium Businesses: A Western Australia Study with Broader Implications,” Computers & Security, vol. 145, pp. 104026–104026, Jul. 2024, doi: https://doi.org/10.1016/j.cose.2024.104026.

[66] C. K. Tan, S. K. Khan, and U. F. Khattak, “Exploration of The Impact of Cyber Situational Awareness On Small and Medium Enterprises (SMEs) in Malaysia,” Journal of Informatics and Web Engineering, vol. 4, no. 1, pp. 292–306, Feb. 2025, doi: https://doi.org/10.33093/jiwe.2025.4.1.21

[67] M. Awan, A. Alam, and M. Kamran, “Cybersecurity Challenges in Small and Medium Enterprises: A Scoping Review,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 3, pp. 89–102, Jul. 2025, doi: https://doi.org/10.63180/jcsra.thestap.2025.3.7

Downloads

Published

2026-01-26

Issue

Section

Articles

How to Cite

Ensemble Learning Methods for Improving SMS Spam Classification Accuracy. (2026). International Journal of Computer Science and Engineering Innovations, 2(1), 25-34. https://doi.org/10.64137/31079458/IJCSEI-V2I1P104