{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:17:31Z","timestamp":1772911051330,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825256","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"3568-3571","source":"Crossref","is-referenced-by-count":3,"title":["Exposing LLM Vulnerabilities: Adversarial Scam Detection and Performance"],"prefix":"10.1109","author":[{"given":"Chen-Wei","family":"Chang","sequence":"first","affiliation":[{"name":"Virginia Tech,Department of Computer Science,USA"}]},{"given":"Shailik","family":"Sarkar","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Computer Science,USA"}]},{"given":"Shutonu","family":"Mitra","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Computer Science,USA"}]},{"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Computer Science,USA"}]},{"given":"Hossein","family":"Salemi","sequence":"additional","affiliation":[{"name":"Department of Information Sciences and Technology"}]},{"given":"Hemant","family":"Purohit","sequence":"additional","affiliation":[{"name":"Department of Information Sciences and Technology"}]},{"given":"Fengxiu","family":"Zhang","sequence":"additional","affiliation":[{"name":"George Mason University,School of Policy and Government,USA"}]},{"given":"Michin","family":"Hong","sequence":"additional","affiliation":[{"name":"Indiana University,School of Social Work,USA"}]},{"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Computer Science,USA"}]},{"given":"Chang-Tien","family":"Lu","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Computer Science,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Combating phone scams with llm-based detection: Where do we stand?","author":"Shen","year":"2024"},{"key":"ref2","article-title":"An empirical analysis of sms scam detection systems","author":"Salman","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3510030"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICICV50876.2021.9388431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.81"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.603"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.33140\/eoa.01.02.10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1163\/9789004719118_050"},{"key":"ref9","article-title":"An llm can fool itself: A prompt-based adversarial attack","author":"Xu","year":"2023"},{"key":"ref10","article-title":"Uncovering the reliability and consistency of ai language models: A systematic study","author":"Khatun","year":"2024"},{"key":"ref11","article-title":"From ml to llm: Evaluating the robustness of phishing webpage detection models against adversarial attacks","author":"Kulkarni","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.427"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2284145"},{"key":"ref14","article-title":"Fraudulent job posting dataset","year":"2023"},{"key":"ref15","article-title":"Email spam or not classification dataset","year":"2023"},{"key":"ref16","article-title":"Spam or not spam dataset","author":"Ozler","year":"2023"},{"key":"ref17","article-title":"Scamwarners website"},{"key":"ref18","article-title":"Adversarial training for free!","volume":"32","author":"Shafahi","year":"2019","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825256.pdf?arnumber=10825256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:24:35Z","timestamp":1737102275000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825256","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}