{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:37:31Z","timestamp":1757619451594,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819500192"},{"type":"electronic","value":"9789819500208"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-95-0020-8_9","type":"book-chapter","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T09:16:00Z","timestamp":1753262160000},"page":"101-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LENS-RMHR: Enhancing Telecom Fraud Detection with Large Language Model Neuron Selection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4694-5900","authenticated-orcid":false,"given":"Cheng","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5591-721X","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huilin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"key":"9_CR1","unstructured":"Li, Z.: An increase in telecommunications fraud cases in the United States. China: People\u2019s Daily (2024). http:\/\/paper.people.com.cn\/rmrb\/html\/2024-03\/22\/nw.D110000renmrb_20240322_6-16.htm"},{"key":"9_CR2","unstructured":"Zhang, H.: The public security organs have achieved remarkable results in cracking down on telecommunications network fraud crimes. China: China economic network (2024). http:\/\/finance.ce.cn\/money\/202401\/08\/t20240108_38857275.shtml"},{"key":"9_CR3","unstructured":"Gurnee, W., Nanda, N., Pauly, M., Harvey, K., Troitskii, D., Bertsimas, D.: Finding neurons in a haystack: case studies with sparse probing. arXiv preprint arXiv:2305.01610 (2023)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Jiao, D., Liu, Y., Tang, Z., Matter, D., Pfeffer, J., Anderson, A.: SPIN: Sparsifying and integrating internal neurons in large language models for text classification. In: Findings of the Association for Computational Linguistics ACL 2024, pp. 4666\u20134682 (2024)","DOI":"10.18653\/v1\/2024.findings-acl.277"},{"key":"9_CR5","unstructured":"Sun, C.-J., Ji, J., Shang, B., Liu, B.: Overview of CCL23-eval task 6: telecom network fraud case classification. In: Proceedings of the 22nd Chinese National Conference on Computational Linguistics (Volume 3: Evaluations), pp. 193\u2013200 (2023)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Liu, B., Lu, C., et al.: Lies in the air: characterizing fake-base-station spam ecosystem in China. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 521\u2013534 (2020)","DOI":"10.1145\/3372297.3417257"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"11628","DOI":"10.3390\/app142411628","volume":"14","author":"J Li","year":"2024","unstructured":"Li, J., Zhang, C., Jiang, L.: Innovative telecom fraud detection: a new dataset and an advanced model with RoBERTa and dual loss functions. Appl. Sci. 14, 11628 (2024)","journal-title":"Appl. Sci."},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/s13042-019-00982-x","volume":"11","author":"H Hajiabadi","year":"2020","unstructured":"Hajiabadi, H., Molla-Aliod, D., Monsefi, R., Yazdi, H.S.: Combination of loss functions for deep text classification. Int. J. Mach. Learn. Cybern. 11, 751\u2013761 (2020)","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Li, J., Tu, Z., Yang, B., Lyu, M.R., Zhang, T.: Multi-head attention with disagreement regularization. arXiv preprint. arXiv:1810.10183 (2018)","DOI":"10.18653\/v1\/D18-1317"},{"key":"9_CR10","unstructured":"Mao, A., Mohri, M., Zhong, Y.: Cross-entropy loss functions: theoretical analysis and applications. In: International Conference on Machine Learning. PMLR, pp. 23803\u201323828 (2023)"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"3504","DOI":"10.1109\/TASLP.2021.3124365","volume":"29","author":"Y Cui","year":"2021","unstructured":"Cui, Y., Che, W., Liu, T., Qin, B., Yang, Z.: Pre-training with whole word masking for Chinese BERT. IEEE\/ACM Trans. Audio Speech Lang. Process. 29, 3504\u20133514 (2021)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"9_CR12","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (2017)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Y., He, M., Shi, M., Jeon, S.: A novel model combining transformer and Bi-LSTM for news categorization. IEEE Trans. Comput. Soc. Syst. 11, 4862\u20134869 (2022)","DOI":"10.1109\/TCSS.2022.3223621"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, X., Huang, R., Jin, L., Wan, F.: A BERT-GCN-based detection method for FBS telecom fraud chinese sms texts. In: 2023 4th International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI). IEEE, pp. 448\u2013453 (2023)","DOI":"10.1109\/ICHCI58871.2023.10277819"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Ruan, J., Caballero, J.M., Juanatas, R.A.: Chinese news text classification method based on attention mechanism. In: 2022 7th International Conference on Business and Industrial Research (ICBIR). IEEE, pp. 330\u2013334 (2022)","DOI":"10.1109\/ICBIR54589.2022.9786458"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"7915","DOI":"10.3390\/app13137915","volume":"13","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Wang, Y., Hu, H., Zhou, S., Wang, Q.: Knowledge-graph-and GCN-based domain Chinese long text classification method. Appl. Sci. 13, 7915 (2023)","journal-title":"Appl. Sci."},{"key":"9_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.107075","volume":"162","author":"H Yu","year":"2023","unstructured":"Yu, H., et al.: An intent classification method for questions in treatise on febrile diseases based on TinyBERT-CNN fusion model. Comput. Biol. Med. Biol. Med. 162, 107075 (2023)","journal-title":"Comput. Biol. Med. Biol. Med."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-0020-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T19:30:35Z","timestamp":1757273435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-0020-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819500192","9789819500208"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-0020-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}