{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:18:50Z","timestamp":1776107930486,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3703672","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"340-345","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Scams and Frauds in the Digital Age: ML-Based Detection and Prevention Strategies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6069-572X","authenticated-orcid":false,"given":"Sai Venkata Jaswant","family":"Kolupuri","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, RV University, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2369-4223","authenticated-orcid":false,"given":"Ananya","family":"Paul","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, RV University, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4656-1762","authenticated-orcid":false,"given":"Rajat Subhra","family":"Bhowmick","sequence":"additional","affiliation":[{"name":"Indian Institute of Engineering Science and Technology, Shibpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1849-661X","authenticated-orcid":false,"given":"Isha","family":"Ganguli","sequence":"additional","affiliation":[{"name":"Jain (Deemed to be) University, Bengaluru, India"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Zainab Alkhalil Chaminda Hewage Liqaa Nawaf and Imtiaz Khan. 2021. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Frontiers in Computer Science 3 (2021).","DOI":"10.3389\/fcomp.2021.563060"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Reem\u00a0A Alzahrani and Malak Aljabri. 2022. AI-based techniques for Ad click fraud detection and prevention: Review and research directions. Journal of Sensor and Actuator Networks 12 1 (2022) 4.","DOI":"10.3390\/jsan12010004"},{"key":"e_1_3_3_1_4_2","first-page":"338","volume-title":"2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS)","author":"Baik Seongbok","year":"2023","unstructured":"Seongbok Baik. 2023. Detecting Digital Ad Fraud by Active Reinforcement Learning. In 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS). 338\u2013340."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Ch\u00a0Md\u00a0Rakin Haider Anindya Iqbal Atif\u00a0Hasan Rahman and M\u00a0Sohel Rahman. 2018. An ensemble learning based approach for impression fraud detection in mobile advertising. Journal of Network and Computer Applications 112 (2018) 126\u2013141.","DOI":"10.1016\/j.jnca.2018.02.021"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Tzipora Halevi Nasir Memon and Oded Nov. 2015. Spear-Phishing in the Wild: A Real-World Study of Personality Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks. SSRN Electronic Journal (01 2015). 10.2139\/ssrn.2544742","DOI":"10.2139\/ssrn.2544742"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Sahand Hariri Matias\u00a0Carrasco Kind and Robert\u00a0J Brunner. 2019. Extended isolation forest. IEEE transactions on knowledge and data engineering 33 4 (2019) 1479\u20131489.","DOI":"10.1109\/TKDE.2019.2947676"},{"key":"e_1_3_3_1_8_2","unstructured":"Javier Hernandez-Ortega Ruben Tolosana Julian Fierrez and Aythami Morales. 2020. Deepfakeson-phys: Deepfakes detection based on heart rate estimation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.00400 (2020)."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"A.K. Jain A. Ross and S. Prabhakar. 2004. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14 1 (2004) 4\u201320. 10.1109\/TCSVT.2003.818349","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Keith\u00a0S Jones Miriam\u00a0E Armstrong McKenna\u00a0K Tornblad and Akbar\u00a0Siami Namin. 2020. How social engineers use persuasion principles during vishing attacks. Information & Computer Security 29 2 (2020) 314\u2013331.","DOI":"10.1108\/ICS-07-2020-0113"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Greeshma Lingam Rashmi\u00a0Ranjan Rout and Durvasula\u00a0VLN Somayajulu. 2019. Adaptive deep Q-learning model for detecting social bots and influential users in online social networks. Applied Intelligence 49 11 (2019) 3947\u20133964.","DOI":"10.1007\/s10489-019-01488-3"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Lutfun Lota and B\u00a0M\u00a0Mainul Hossain. 2017. A Systematic Literature Review on SMS Spam Detection Techniques. International Journal of Information Technology and Computer Science 9 (07 2017) 42\u201350. 10.5815\/ijitcs.2017.07.05","DOI":"10.5815\/ijitcs.2017.07.05"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Stephen Mujeye. 2021. A Survey on Multi-Factor Authentication Methods for Mobile Devices. Association for Computing Machinery (2021) 199\u2013205. 10.1145\/3451471.3451503","DOI":"10.1145\/3451471.3451503"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Thanh\u00a0Thi Nguyen Quoc Viet\u00a0Hung Nguyen Dung\u00a0Tien Nguyen Duc\u00a0Thanh Nguyen Thien Huynh-The Saeid Nahavandi Thanh\u00a0Tam Nguyen Quoc-Viet Pham and Cuong\u00a0M Nguyen. 2022. Deep learning for deepfakes creation and detection: A survey. Computer Vision and Image Understanding 223 (2022) 103525.","DOI":"10.1016\/j.cviu.2022.103525"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93372-6_26"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Mansoor RAZA Nathali\u00a0Dilshani Jayasinghe and Muhana Magboul\u00a0Ali Muslam. 2021. A Comprehensive Review on Email Spam Classification using Machine Learning Algorithms. (2021) 327\u2013332. 10.1109\/ICOIN50884.2021.9334020","DOI":"10.1109\/ICOIN50884.2021.9334020"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Pradeep\u00a0Kumar Roy Jyoti\u00a0Prakash Singh and Snehasish Banerjee. 2020. Deep learning to filter SMS Spam. Future Generation Computer Systems 102 (2020) 524\u2013533.","DOI":"10.1016\/j.future.2019.09.001"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Shadi Sadeghpour and Natalija Vlajic. 2021. Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising. Journal of Cybersecurity and Privacy 1 4 (2021) 804\u2013832.","DOI":"10.3390\/jcp1040039"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Shadi Sadeghpour and Natalija Vlajic. 2021. Click Fraud in Digital Advertising: A Comprehensive Survey. Computers 10 12 (2021).","DOI":"10.3390\/computers10120164"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Tarunpreet\u00a0Bhatia Sanjeev\u00a0Rao Anil Kumar\u00a0Verma. 2021. A review on social spam detection: Challenges open issues and future directions. Expert Systems with Applications 186 (2021) 115742. 10.1016\/j.eswa.2021.115742","DOI":"10.1016\/j.eswa.2021.115742"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"M. Valavan and S. Rita. 2023. Predictive-Analysis-based Machine Learning Model for Fraud Detection with Boosting Classifiers. Computer Systems Science and Engineering 45 (01 2023) 231\u2013245. 10.32604\/csse.2023.026508","DOI":"10.32604\/csse.2023.026508"},{"key":"e_1_3_3_1_22_2","unstructured":"Zhenyi Wang Yan Li Li Shen and Heng Huang. 2024. A Unified and General Framework for Continual Learning. (2024). arxiv:https:\/\/arXiv.org\/abs\/2403.13249\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2403.13249"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","location":"Hyderabad India","acronym":"ICDCN 2025"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3703672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":21,"alternative-id":["10.1145\/3700838.3703672","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3703672","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}