{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:45:19Z","timestamp":1772909119246,"version":"3.50.1"},"reference-count":100,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825656","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"5315-5324","source":"Crossref","is-referenced-by-count":2,"title":["Gen-AI for User Safety: A Survey"],"prefix":"10.1109","author":[{"given":"Akshar Prabhu","family":"Desai","sequence":"first","affiliation":[{"name":"Google"}]},{"given":"Tejasvi","family":"Ravi","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Mohammad","family":"Luqman","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Mohit","family":"Sharma","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Nithya","family":"Kota","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Pranjul","family":"Yadav","sequence":"additional","affiliation":[{"name":"Google"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Detecting phishing sites using chatgpt","author":"Koide","year":"2023","journal-title":"ArXiv"},{"key":"ref2","author":"Koide","year":"2024","journal-title":"Chatspamdetector: Leveraging large language models for effective phishing email detection"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.716"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2024.100546"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.compind.2018.01.018","article-title":"An early risk detection and management system for the cloud with log parser","volume":"97","author":"Nagashree","year":"2018","journal-title":"Computers in Industry"},{"key":"ref6","author":"Ferrag","year":"2024","journal-title":"Generative ai and large language models for cyber security: All insights you need"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125546"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663424"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.ijcnlp-main.64"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.313"},{"key":"ref11","author":"Xuan","year":"2024","journal-title":"Lemma: Towards lvlm-enhanced multimodal misinformation detection with external knowledge augmentation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-naacl.95"},{"key":"ref13","article-title":"Mmidr: Teaching large language model to interpret multimodal misinformation via knowledge distillation","author":"Wang","year":"2024","journal-title":"ArXiv"},{"key":"ref14","first-page":"7621","article-title":"DRCT: Diffusion reconstruction contrastive training towards universal detection of diffusion generated images","volume-title":"Proceedings of the 41st International Conference on Machine Learning, volume 235 of Proceedings of Machine Learning Research","author":"Chen"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/178"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.64"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650828"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA58977.2023.00186"},{"key":"ref19","author":"Rieskamp","year":"2023","journal-title":"Genai-powered social bots for crisis communication: A systematic literature review"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/wfpst58552.2024.00009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/cai59869.2024.00159"},{"key":"ref22","author":"Wang","year":"2024","journal-title":"Vi-siongpt: Llm-assisted real-time anomaly detection for safe visual navigation"},{"key":"ref23","author":"Spitale","year":"2023","journal-title":"Vita: A multi-modal llm-based system for longitudinal, autonomous, and adaptive robotic mental well-being coaching"},{"key":"ref24","author":"Wu","year":"2024","journal-title":"\u201cI like sunnie more than i expected!\u201d: Exploring user expectation and perception of an anthropomorphic llm-based conversational agent for well-being support"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/kst61284.2024.10499678"},{"key":"ref26","author":"Jahan","year":"2024","journal-title":"A comprehensive study on nlp data augmentation for hate speech detection: Legacy methods, bert, and llms"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14428\/esann\/2024.es2024-222"},{"key":"ref28","article-title":"Pushing the limit of llm capacity for text classification","author":"Zhang","year":"2024"},{"key":"ref29","article-title":"Roberta: A robustly optimized bert pre-training approach","volume":"364","author":"Liu","year":"2019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA58977.2023.00237"},{"key":"ref31","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks","volume":"33","author":"Lewis","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671977"},{"key":"ref33","article-title":"Code-mixed sentiment and hate-speech prediction","author":"Yadav","year":"2024"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70381-2_25"},{"issue":"1","key":"ref35","first-page":"1","article-title":"The dawn of lmms: Preliminary explorations with gpt-4v (ision)","volume":"9","author":"Yang","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"ref38","article-title":"Moderating illicit online image promotion for unsafe user-generated content games using large vision-language models","author":"Guo","year":"2024"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00553"},{"key":"ref40","article-title":"Supervision exists everywhere: A data efficient contrastive language-image pre-training paradigm","author":"Li","year":"2021"},{"key":"ref41","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International conference on machine learning","author":"Radford"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00916"},{"key":"ref43","article-title":"Unsafebench: Benchmarking image safety classifiers on real-world and ai-generated images","author":"Qu","year":"2024"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/UR61395.2024.10597464"},{"key":"ref45","article-title":"Vision language model for interpretable and fine-grained detection of safety compliance in diverse workplaces","author":"Chen","year":"2024"},{"key":"ref46","doi-asserted-by":"crossref","article-title":"Construction safety inspection workflow with clip-based image captioning and attention generation","author":"Tsai","DOI":"10.2139\/ssrn.4819831"},{"key":"ref47","article-title":"Understanding the characteristics of internet short video sharing: Youtube as a case study","author":"Cheng","year":"2007"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508288"},{"key":"ref49","article-title":"Identifying offensive videos on youtube","volume-title":"Master\u2019s thesis","author":"Kandakatla","year":"2016"},{"key":"ref50","article-title":"Towards understanding unsafe video generation","author":"Pang","year":"2024"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154404"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13100-x"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102103"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3512527.3531350"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/O-COCOSDA60357.2023.10482977"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3643651.3659894"},{"key":"ref57","article-title":"Fakeavceleb: A novel audio-video multimodal deepfake dataset","author":"Khalid","year":"2021"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01453"},{"key":"ref59","article-title":"Wavefake: A data set to facilitate audio deepfake detection","author":"Frank","year":"2021"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78341-8_12"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10650962"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-3015"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.sigdial-1.45"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124912"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3363469"},{"key":"ref66","volume-title":"Openai is shockingly good at unminifying code"},{"key":"ref67","article-title":"Multimodal chain-of-thought reasoning via chatgpt to protect children from age-inappropriate apps","author":"Hu","year":"2024"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-04-2022-0090"},{"key":"ref70","article-title":"The world of generative ai: Deep-fakes and large language models","author":"Mitra","year":"2024"},{"key":"ref71","article-title":"Ratgpt: Turning online llms into proxies for malware attacks","author":"Beckerich","year":"2023"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ISCS61804.2024.10581181"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3378446"},{"key":"ref74","first-page":"270","article-title":"Generating personalized phishing emails for social engineering training based on neural language models","volume-title":"International Conference on Broadband and Wireless Computing, Communication and Applications","author":"Guo"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4602790"},{"key":"ref76","article-title":"From the scammer perspective: Predispositions towards online fraud motivation and rationalization","volume-title":"Master\u2019s thesis","author":"Ansari","year":"2020"},{"key":"ref77","author":"Wang","year":"2023","journal-title":"Synthetic realities in the digital age: navigating the opportunities and challenges of ai-generated content"},{"key":"ref78","author":"Pathmanathan","year":"2024","journal-title":"Is poisoning a real threat to llm alignment? maybe more so than you think"},{"key":"ref79","article-title":"Easyjailbreak: A unified framework for jailbreaking large language models","author":"Zhou","year":"2024"},{"key":"ref80","article-title":"Ai safety in generative ai large language models: A survey","author":"Chua","year":"2024"},{"key":"ref81","article-title":"Mission impossible: A statistical perspective on jailbreaking llms","author":"Su","year":"2024"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2024.2324540"},{"key":"ref83","article-title":"Lockpicking llms: A logit-based jailbreak using token-level manipulation","author":"Li","year":"2024"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3599696.3612895"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3630106.3658932"},{"key":"ref86","first-page":"43","article-title":"Chatgpt in content creation: Techniques, applications, and ethical implications","volume-title":"Advanced Applications of Generative AI and Natural Language Processing Models","author":"Htet","year":"2024"},{"key":"ref87","author":"Kumar Chawdhury","year":"2024","journal-title":"Content moderation: An llm api with a carefully crafted system prompt is all you need"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3616855.3635736"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54827-7_8"},{"key":"ref90","article-title":"Detoxbench: Benchmarking large language models for multitask fraud & abuse detection","author":"Chakraborty","year":"2024"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070800"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1162\/dint_a_00191"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3296837"},{"issue":"3s","key":"ref94","doi-asserted-by":"crossref","first-page":"1138","DOI":"10.52783\/jes.1427","article-title":"Machine learning models for fraud detection: A comprehensive review and empirical analysis","volume":"20","author":"Akhare","year":"2024","journal-title":"Journal of Electrical Systems"},{"key":"ref95","first-page":"1791","article-title":"The good the bad the ugly of artificial intelligence & why it matters in education","volume-title":"EdMedia+ Innovate Learning","author":"Khaddage","year":"2019"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2024.106019"},{"key":"ref97","author":"Anderljung","year":"2023","journal-title":"Protecting society from ai misuse: when are restrictions on capabilities warranted?"},{"key":"ref98","article-title":"Trustworthy, responsible, and safe ai: A comprehensive architectural framework for ai safety with challenges and mitigations","author":"Chen","year":"2024"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2024.3414445"},{"key":"ref100","author":"Desai","year":"2024","journal-title":"Opportunities and challenges of generative-ai in finance"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825656.pdf?arnumber=10825656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:47:52Z","timestamp":1737100072000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825656\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":100,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825656","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}