{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T23:25:27Z","timestamp":1777418727733,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,14]]},"DOI":"10.1145\/3677052.3698655","type":"proceedings-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T06:38:06Z","timestamp":1731566286000},"page":"745-751","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["AI versus AI in Financial Crimes &amp; Detection: GenAI Crime Waves to Co-Evolutionary AI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8016-5563","authenticated-orcid":false,"given":"Eren","family":"Kurshan","sequence":"first","affiliation":[{"name":"Princeton University, US"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1040-9032","authenticated-orcid":false,"given":"Dhagash","family":"Mehta","sequence":"additional","affiliation":[{"name":"Blackrock, US"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5148-2033","authenticated-orcid":false,"given":"Tucker","family":"Balch","sequence":"additional","affiliation":[{"name":"Emory University, US"}]}],"member":"320","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"KPMG","author":"Hicks","year":"2019","unstructured":"D. Hicks et.al. Global Banking Fraud Survey The Multi-Faceted Threat Of Fraud: Are Banks Up To The Challenge?, KPMG (2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"Fraud Costs and Volumes Remain Significantly Higher than Pre-Pandemic for Financial Services and Lending Firm 2022"},{"key":"e_1_3_2_1_3_1","unstructured":"Fraud Attempts Spike 80% Globally From Pre-Pandemic Levels Transunion News Report 3\/15\/2023"},{"key":"e_1_3_2_1_4_1","unstructured":"E-commerce Fraud Trends and Statistics Merchants Need to Know in 2024 Mastercard News and Insights 2024"},{"key":"e_1_3_2_1_5_1","volume-title":"SC Magazine","author":"Hackers","year":"2024","unstructured":"Hackers \u2018Steal Your Face\u2019 to create deep fakes that rob bank accounts, S. Zurier et.al., SC Magazine, Feb 2024"},{"key":"e_1_3_2_1_6_1","unstructured":"Threat of Deep Fake Identities Department of Homeland Security Report"},{"key":"e_1_3_2_1_7_1","unstructured":"Voice Cloning With A Few Samples. Arik S. Chen J. Peng K. Ping W. And Zhou Y. 2018. Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_8_1","unstructured":"Navigating the Challenges and Opportunities of Synthetic Voices OpenAI Blog 2024"},{"key":"e_1_3_2_1_9_1","volume-title":"University College London","author":"Enabled Future Crime","year":"2020","unstructured":"AI-Enabled Future Crime, University College London, 2020"},{"key":"e_1_3_2_1_10_1","volume-title":"et.al","author":"Kurshan E.","year":"2020","unstructured":"Kurshan, E. et.al. 2020. Graph Computing For Financial Crime And Fraud Detection International Journal Of Semantic Computing, 14(04), Pp.565-589."},{"key":"e_1_3_2_1_11_1","volume-title":"European Central Bank, Press Release","author":"Card","year":"2023","unstructured":"Card fraud in Europe declines significantly, European Central Bank, Press Release, May 2023"},{"key":"e_1_3_2_1_12_1","unstructured":"$35M stolen in voice clone as deepfake tech availability increases F. Hersey Biometric Update.com"},{"key":"e_1_3_2_1_13_1","unstructured":"Advances in AI Let Voice Clones Fool Banks\u2019 Voice Authentication Security Systems United States Senate"},{"key":"e_1_3_2_1_14_1","volume-title":"Treasury Report","author":"Managing Artificial Intelligence-Specific","year":"2024","unstructured":"Managing Artificial Intelligence-Specific Cybersecurity Risks in the Financial Services Sector, U.S. Treasury Report, 2024"},{"key":"e_1_3_2_1_15_1","unstructured":"Fake Image of Pentagon Bombing Briefly Sends Jitters Through Stock Market Associated Press P. Marcello May 2023"},{"key":"e_1_3_2_1_16_1","volume-title":"ACM International Conference on AI in Finance (pp. 1-8).","author":"Kurshan E.","unstructured":"Kurshan, E., Shen, H. and Chen, J., Towards self-regulating AI: Challenges and opportunities of AI model governance in financial services. ACM International Conference on AI in Finance (pp. 1-8)."},{"key":"e_1_3_2_1_17_1","unstructured":"Bureau of Investigation: Elderly Fraud Report 2023"},{"key":"e_1_3_2_1_18_1","volume-title":"National Security Administration Report","author":"Phishing Guidance","year":"2023","unstructured":"Phishing Guidance: Stopping The Attack Cycle at Phase One, National Security Administration Report, October 2023"},{"key":"e_1_3_2_1_19_1","volume-title":"Osborne","author":"Worm GPT","year":"2023","unstructured":"WormGPT: What To Know About ChatGPTs Malicious Cousin, C. Osborne, Oct 2023"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Falade P.V. 2023. Decoding the threat landscape: Chatgpt Fraudgpt and wormgpt in social engineering attacks. arXiv preprint arXiv:2310.05595.","DOI":"10.32628\/CSEIT2390533"},{"key":"e_1_3_2_1_21_1","volume-title":"ACM conference on Computer and communications security (pp. 833-844)","author":"Bilge L.","unstructured":"Bilge, L. and Dumitra\u015f, T., Before we knew it: an empirical study of zero-day attacks in the real world. ACM conference on Computer and communications security (pp. 833-844)."},{"key":"e_1_3_2_1_22_1","first-page":"747","volume-title":"et.al","author":"Rudie J.D.","year":"2021","unstructured":"Rudie, J.D. et.al. 2021, December. Technical analysis of the NSO group's pegasus spyware. CSCI (pp. 747-752)."},{"key":"e_1_3_2_1_23_1","volume-title":"et.al","author":"Marczak B.","year":"2023","unstructured":"Marczak, B., et.al. 2023. Triple Threat: NSO Group's Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT54504.2022.9817175"},{"key":"e_1_3_2_1_25_1","first-page":"150","volume-title":"International Conference, DIMVA","author":"Mulliner","year":"2013","unstructured":"C. Mulliner et.al. SMS-Based One-Time Passwords: Attacks and Defense: In Detection of Intrusions and Malware, and Vulnerability Assessment, International Conference, DIMVA 2013, 10 (pp. 150-159)"},{"key":"e_1_3_2_1_26_1","volume-title":"Kursun E. US 2020\/0184053","author":"Generative","unstructured":"Generative adversarial network training and feature extraction for biometric authentication, Kursun E. US 2020\/0184053"},{"key":"e_1_3_2_1_27_1","volume-title":"Deloitte Report","author":"Generative","year":"2024","unstructured":"Generative AI Is Expected To Magnify The Risk of Deep Fakes and Other Fraud In Banking, S. Lalchand, V. Srinivas, B. Maggiore, J. Henderson, Deloitte Report, 2024"},{"key":"e_1_3_2_1_28_1","volume-title":"Wall Street Journal","author":"Bousquette","year":"2024","unstructured":"I. Bousquette, \u201cDeep Fakes Are Coming For the Financial Sector\u201d Wall Street Journal, April 3, 2024."},{"key":"e_1_3_2_1_29_1","unstructured":"GenAI Drives 1 760% Surge in Business Email Compromise (BEC) Attacks PRNewsWire Feb 2024"},{"key":"e_1_3_2_1_30_1","unstructured":"Deep Fake Imposter Scams Are Driving a New Wave of Fraud N.Ahmed et.al. Bloomberg News 2023"},{"key":"e_1_3_2_1_31_1","unstructured":"Using AI to Detect AI-Generated DeepFakes Can Work for Audio - But not Always H. Jingnan April 2024 NPR"},{"key":"e_1_3_2_1_32_1","volume-title":"KPMG Regulatory Insights Report, A. Matsuo","author":"Regulatory Alert","year":"2024","unstructured":"Regulatory Alert - Fraud, Identity Theft and Other Scams, KPMG Regulatory Insights Report, A. Matsuo, Feb 2024"},{"key":"e_1_3_2_1_33_1","volume-title":"US11269983B2","author":"Kursun E.","year":"2019","unstructured":"Kursun E., Thermally enriched multi-modal and multi-channel biometric authentication, US11269983B2, 2019, United States Patent Office"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Kurshan E. Shen H. and Yu H. Financial crime & fraud detection using graph computing:In 2020 IEEE Transdisciplinary AI (pp. 125-130).","DOI":"10.1109\/TransAI49837.2020.00029"},{"key":"e_1_3_2_1_35_1","unstructured":"United Nations Office of Drug and Crime Press 2010"},{"key":"e_1_3_2_1_36_1","unstructured":"Anti-Money Laundering Ernst & Young Discussion Paper M. Schlepper et.al. 2024"},{"key":"e_1_3_2_1_37_1","unstructured":"Federal Trade Commission Explore Data Retrieved 2024"},{"key":"e_1_3_2_1_38_1","volume-title":"Juniper Research Report","author":"Online Payment Fraud","year":"2023","unstructured":"Online Payment Fraud: Market Forecasts, Emerging Threats & Segment Analysis 2023-2028, Juniper Research Report, 2023"},{"key":"e_1_3_2_1_39_1","volume-title":"FTC, Consumer Alert","author":"Think","year":"2024","unstructured":"Think you know what the top scam of 2023 was? Take a guess, L. Bingo, FTC, Consumer Alert, Feb 2024"},{"key":"e_1_3_2_1_40_1","volume-title":"Cyber-Attacks: The Apex of Crime-As-A-Service","author":"Europol Spotlight","year":"2023","unstructured":"Europol Spotlight, Cyber-Attacks: The Apex of Crime-As-A-Service, 2023"},{"key":"e_1_3_2_1_41_1","unstructured":"Interpol Global Financial Fraud Assessment Report 2024"},{"key":"e_1_3_2_1_42_1","unstructured":"List of Recent Data Breaches Wikipedia"},{"key":"e_1_3_2_1_43_1","volume-title":"Insights at the Intersection of Financial Crime Data & Real Survivor Stories","author":"Verafin","year":"2024","unstructured":"NASDAQ-Verafin 2024 Global Financial Crime Report: Insights at the Intersection of Financial Crime Data & Real Survivor Stories, 2024"},{"key":"e_1_3_2_1_44_1","volume-title":"E. Cahill","author":"Experian Blog","year":"2022","unstructured":"Experian Blog, What's the Difference Between Phishing, Smishing and Vishing?, E. Cahill, 2022"},{"key":"e_1_3_2_1_45_1","volume-title":"Beckman","author":"The Most Alarming Vishing","year":"2023","unstructured":"The Most Alarming Vishing Statistics You Need to Know in 2023, J. Beckman, May 2024, TechReport.com"},{"key":"e_1_3_2_1_46_1","volume-title":"McAfee Report","author":"Artificial Intelligence Voice","year":"2023","unstructured":"Artificial Intelligence Voice Scams on the Rise with 1 in 4 Adults Impacted, McAfee Report, May 2023"},{"key":"e_1_3_2_1_47_1","volume-title":"BBC News","author":"Cyber","year":"2024","unstructured":"Cyber kidnapping in US illustrates growing crime trend, M. Halpert, BBC News, January 2024"},{"key":"e_1_3_2_1_48_1","unstructured":"AI heralds the next generation of financial scams S. Venkataramakrishnan Financial times January 2024"},{"key":"e_1_3_2_1_49_1","volume-title":"The New York Times","author":"The Criminal Silicon Valley","year":"2019","unstructured":"The Criminal Silicon Valley is Thriving, J. Lusthaus, The New York Times, 2019"},{"key":"e_1_3_2_1_50_1","unstructured":"Graphs to Knowledge Graph-Based Computing E. Kurshan Researchgate Dec 2023"},{"key":"e_1_3_2_1_51_1","unstructured":"Kaplan J. et.al. Scaling laws for neural language models. arXiv preprint arXiv:2001.08361."},{"key":"e_1_3_2_1_52_1","unstructured":"OpenAI's CEO Says the Age of Giant AI Models Is Already Over Wired.com April 17 2023"},{"key":"e_1_3_2_1_53_1","unstructured":"Real-Time Payments Fraud Is Growing - Here's How to Prevent It T.J. Horan FICO 2023"},{"key":"e_1_3_2_1_54_1","unstructured":"J.G. Wang J. Li M. and Neel S. 2024. Pandora's White-Box: Increased Training Data Leakage in Open LLMs. arXiv preprint arXiv:2402.17012."},{"key":"e_1_3_2_1_55_1","unstructured":"N. 2023. Sources of hallucination by large language models on inference tasks. arXiv preprint arXiv:2305.14552."},{"key":"e_1_3_2_1_56_1","volume-title":"Jailbroken: How does LLM safety training fail?. Advances in Neural Information Processing Systems, 36.","author":"Wei A.","year":"2024","unstructured":"Wei, A., Haghtalab, N. and Steinhardt, J., 2024. Jailbroken: How does LLM safety training fail?. Advances in Neural Information Processing Systems, 36."},{"key":"e_1_3_2_1_57_1","first-page":"100211","volume-title":"High-Confidence Computing","author":"Yao Y., A","unstructured":"Yao, Y., A survey on large language model (LLM) security and privacy: The good, the bad, and the ugly. High-Confidence Computing, p.100211."},{"key":"e_1_3_2_1_58_1","volume-title":"et.al","author":"Suzumura T.","year":"2019","unstructured":"Suzumura, T. et.al., 2019. Towards federated graph learning for collaborative financial crimes detection. arXiv preprint arXiv:1909.12946."},{"key":"e_1_3_2_1_59_1","unstructured":"Banks in Singapore begin sharing data to combat financial crime E. Yu ZDNET April 1st 2024"},{"key":"e_1_3_2_1_60_1","unstructured":"Federated Learning In Banking AI Sweden 2023-2025"},{"key":"e_1_3_2_1_61_1","first-page":"2019","article-title":"Attacking artificial intelligence","volume":"8","author":"Comiter M.","year":"2019","unstructured":"Comiter, M., 2019. Attacking artificial intelligence. Belfer Center Paper, 8, pp.2019-08.","journal-title":"Belfer Center Paper"},{"key":"e_1_3_2_1_62_1","volume-title":"NeurIPS Workshop","author":"Backdoors","year":"2023","unstructured":"Backdoors in Deep Learning: The Good, the Bad, and the Ugly,Doan et.al., NeurIPS Workshop, 2023"},{"key":"e_1_3_2_1_63_1","volume-title":"Poisonedrag: Knowledge poisoning attacks to retrieval-augmented generation of large language models.","author":"Zou W.","year":"2024","unstructured":"Zou, W., Geng, R., Wang, B. and Jia, J., 2024. Poisonedrag: Knowledge poisoning attacks to retrieval-augmented generation of large language models."},{"key":"e_1_3_2_1_64_1","volume-title":"Interpol.int","author":"Financial Fraud","year":"2024","unstructured":"INTERPOL Financial Fraud assessment: A global threat boosted by technology, Interpol.int, March 2024"},{"key":"e_1_3_2_1_65_1","volume-title":"IMF","author":"Financial Crimes Hurt Economies","year":"2023","unstructured":"Financial Crimes Hurt Economies and Must be Better Understood and Curbed, C. Claver, C. El. Khoury, R. Weeks-Brown, IMF, 2023"},{"key":"e_1_3_2_1_66_1","unstructured":"What is Account Takeover Fraud and How Can You Mitigate the Risk? A. Hillendah Experian Blog 2023"},{"key":"e_1_3_2_1_67_1","volume-title":"Gregory, Deloitte Insights","author":"Using","year":"2023","unstructured":"Using biometrics to fight back against rising synthetic identity fraud, S. Lachland, V. Srinivas, J. Gregory, Deloitte Insights, 2023"},{"key":"e_1_3_2_1_68_1","unstructured":"Order on the Safe Secure and Trustworthy Development and Use of Artificial Intelligence The White House Oct 30 2023"},{"key":"e_1_3_2_1_69_1","unstructured":"AI Act: First Regulation on Artificial Intelligence European Parliament 08-06-2023"},{"key":"e_1_3_2_1_70_1","unstructured":"NIST Identifies Types of Cyberattacks That Manipulate Behavior of AI Systems National Institute of Standards and Technology (NIST) Jan.2024"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"issue":"3","key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3374217","article-title":"Adversarial attacks on deep-learning models in natural language processing: A survey","volume":"11","author":"Zhang W.E.","year":"2020","unstructured":"Zhang, W.E., 2020. Adversarial attacks on deep-learning models in natural language processing: A survey. ACM TIST, 11(3), pp.1-41.","journal-title":"ACM TIST"},{"key":"e_1_3_2_1_73_1","unstructured":"Stealthy iPhone Hacks That Apple Still Can't Stop L.H. Newman Wired August 25 2021"},{"key":"e_1_3_2_1_74_1","volume-title":"PRNewsWire","author":"Zelle","year":"2024","unstructured":"Zelle soars with $806 billion transaction volume, up 28% from prior year, PRNewsWire, March 04, 2024"},{"key":"e_1_3_2_1_75_1","volume-title":"US Patent, 9268770","year":"2016","unstructured":"and method for research report guided proactive news analytics for streaming news and social media, US Patent, 9268770, 2016"},{"key":"e_1_3_2_1_76_1","unstructured":"Unsupervised machine learning system to automate functions on a graph structure U.S. Patent 11 710 033."},{"key":"e_1_3_2_1_77_1","unstructured":"System and methods to mitigate poisoning attacks within machine learning systems US Patent 11 354 602."},{"key":"e_1_3_2_1_78_1","first-page":"1","article-title":"GenAI against humanity: Nefarious applications of generative artificial intelligence and large language models","author":"Ferrara E.","year":"2024","unstructured":"Ferrara, E., 2024. GenAI against humanity: Nefarious applications of generative artificial intelligence and large language models. Journal of Computational Social Science, pp.1-21.","journal-title":"Journal of Computational Social Science"}],"event":{"name":"ICAIF '24: 5th ACM International Conference on AI in Finance","location":"Brooklyn NY USA","acronym":"ICAIF '24"},"container-title":["Proceedings of the 5th ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677052.3698655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:14:39Z","timestamp":1755882879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"references-count":78,"alternative-id":["10.1145\/3677052.3698655","10.1145\/3677052"],"URL":"https:\/\/doi.org\/10.1145\/3677052.3698655","relation":{},"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"2024-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}