{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:17:23Z","timestamp":1776097043718,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706599.3720263","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T20:07:11Z","timestamp":1745438831000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["\"It Warned Me Just at the Right Moment\": Exploring LLM-based Real-time Detection of Phone Scams"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4950-0627","authenticated-orcid":false,"given":"Zitong","family":"Shen","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7013-5363","authenticated-orcid":false,"given":"Sineng","family":"Yan","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0907-7998","authenticated-orcid":false,"given":"Youqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechinic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Dept. of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2027-168X","authenticated-orcid":false,"given":"Grace","family":"Ngai","sequence":"additional","affiliation":[{"name":"Dept. of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1048-1904","authenticated-orcid":false,"given":"Eugene Yujun","family":"Fu","sequence":"additional","affiliation":[{"name":"Centre for Learning, Teaching and Technology, The Education University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Josh Achiam Steven Adler Sandhini Agarwal Lama Ahmad Ilge Akkaya Florencia\u00a0Leoni Aleman Diogo Almeida Janko Altenschmidt Sam Altman Shyamal Anadkat et\u00a0al. 2023. Gpt-4 technical report. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.08774 (2023)."},{"key":"e_1_3_3_1_3_2","unstructured":"Baidu. 2024. ERNIE-3.5-8K. https:\/\/ai.baidu.com\/ai-doc\/WENXINWORKSHOP\/jlil56u11."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2022.03.028"},{"key":"e_1_3_3_1_5_2","unstructured":"ByteDance. 2024. Doubao-Pro-32k. https:\/\/www.volcengine.com\/product\/doubao."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Isha Chadalavada Tianhui Huang and Jessica Staddon. 2024. Distinguishing Scams and Fraud with Ensemble Learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.08680 (2024). 10.48550\/arXiv.2412.08680 arxiv:https:\/\/arXiv.org\/abs\/2412.08680\u00a0[cs.CR]","DOI":"10.48550\/arXiv.2412.08680"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Chen-Wei Chang Shailik Sarkar Shutonu Mitra Qi Zhang Hossein Salemi Hemant Purohit Fengxiu Zhang Michin Hong Jin-Hee Cho and Chang-Tien Lu. 2024. Exposing LLM Vulnerabilities: Adversarial Scam Detection and Performance. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.00621 (2024). 10.48550\/arXiv.2412.00621 arxiv:https:\/\/arXiv.org\/abs\/2412.00621\u00a0[cs.CR]","DOI":"10.48550\/arXiv.2412.00621"},{"key":"e_1_3_3_1_8_2","unstructured":"Devon Cheyenne. 2024. Scammers can use AI Tools to Clone the Voices of You and Your Family\u2014How to Protect Yourself. CNBC (Jan. 2024). https:\/\/www.cnbc.com\/2024\/01\/24\/how-to-protect-yourself-against-ai-voice-cloning-scams.html Retrieved April 25 2024."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/gby151"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Mary\u00a0T. Dzindolet Scott\u00a0A. Peterson Regina\u00a0A. Pomranky Linda\u00a0G. Pierce and Hall\u00a0P. Beck. 2003. The Role of Trust in Automation Reliance. International Journal of Human-Computer Studies 58 6 (2003) 697\u2013718. 10.1016\/S1071-5819(03)00038-7","DOI":"10.1016\/S1071-5819(03)00038-7"},{"key":"e_1_3_3_1_11_2","unstructured":"Team GLM Aohan Zeng Bin Xu Bowen Wang Chenhui Zhang Da Yin Dan Zhang Diego Rojas Guanyu Feng Hanlin Zhao et\u00a0al. 2024. Chatglm: A family of large language models from glm-130b to glm-4 all tools. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.12793 (2024)."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3660354.3660356"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Xinxin Hu Hongchang Chen Shuxin Liu Haocong Jiang Guanghan Chu and Ran Li. 2022. BTG: A Bridge to Graph Machine Learning in Telecommunications Fraud Detection. Future Generation Computer Systems 137 (2022) 274\u2013287. 10.1016\/j.future.2022.07.020","DOI":"10.1016\/j.future.2022.07.020"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Xinxin Hu Haotian Chen Junjie Zhang Hongchang Chen Shuxin Liu Xing Li Yahui Wang and Xiangyang Xue. 2024. GAT-COBO: Cost-Sensitive Graph Neural Network for Telecom Fraud Detection. IEEE Transactions on Big Data 10 4 (2024) 528\u2013542. 10.1109\/TBDATA.2024.3352978","DOI":"10.1109\/TBDATA.2024.3352978"},{"key":"e_1_3_3_1_15_2","unstructured":"Aaron Hurst Adam Lerer Adam\u00a0P Goucher Adam Perelman Aditya Ramesh Aidan Clark AJ Ostrow Akila Welihinda Alan Hayes Alec Radford et\u00a0al. 2024. Gpt-4o system card. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2410.21276 (2024)."},{"key":"e_1_3_3_1_16_2","unstructured":"Liam Kennedy. 2014. AI Voice Scams are Coming: Here\u2019s What You Need to Know. CHOICE Australia (2014). https:\/\/www.choice.com.au\/consumers-and-data\/protecting-your-data\/data-privacy-and-safety\/articles\/ai-voice-scams Retrieved April 25 2024."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Tianshi Li Julia\u00a0Katherine Haines Miguel Flores\u00a0Ruiz De\u00a0Eguino Jason\u00a0I. Hong and Jeffrey Nichols. 2023. Alert Now or Never: Understanding and Predicting Notification Preferences of Smartphone Users. ACM Transactions on Computer-Human Interaction 29 5 Article 39 (2023) 33\u00a0pages. 10.1145\/3478868","DOI":"10.1145\/3478868"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.2991\/978-2-38476-098-5_43"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2580509"},{"key":"e_1_3_3_1_20_2","unstructured":"Brian New Lexi Salazar Mike Lozano and Scott Fralicks. 2024. Deepfakes of Elon Musk Are Contributing to Billions of Dollars in Fraud Losses in the U.S. CBS News Texas (24 Nov. 2024). https:\/\/www.cbsnews.com\/texas\/news\/deepfakes-ai-fraud-elon-musk\/ Accessed: 2024-01-22."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1177\/154193120805200422"},{"key":"e_1_3_3_1_22_2","first-page":"463","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Pandit Sharbani","year":"2023","unstructured":"Sharbani Pandit, Koutilya Sarker, Roberto Perdisci, Mustaque Ahamad, and Duen\u00a0Horng Yang. 2023. Combating Robocalls with Phone Virtual Assistant Mediated Interaction. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, 463\u2013479."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Andrea Papenmeier Dagmar Kern Gwenn Englebienne and Christin Seifert. 2022. It\u2019s Complicated: The Relationship between User Trust Model Accuracy and Explanations in AI. ACM Transactions on Computer-Human Interaction 29 4 Article 35 (March 2022) 33\u00a0pages. 10.1145\/3495013","DOI":"10.1145\/3495013"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Katalin Parti and Faika Tahir. 2023. \u201cIf We Don\u2019t Listen to Them We Make Them Lose More than Money:\u201d Exploring Reasons for Underreporting and the Needs of Older Scam Victims. Social Sciences 12 5 (2023) 264.","DOI":"10.3390\/socsci12050264"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2018.00025"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Lubna Razaq Tallal Ahmad Samia Ibtasam Umer Ramzan and Shrirang Mare. 2021. \" We Even Borrowed Money From Our Neighbor\" Understanding Mobile-based Frauds Through Victims\u2019 Experiences. Proceedings of the ACM on human-computer interaction 5 CSCW1 (2021) 1\u201330.","DOI":"10.1145\/3449115"},{"key":"e_1_3_3_1_27_2","volume-title":"International Scammers Steal Over $1 Trillion in 12 Months in Global State of Scams Report 2024","author":"Rogers Sam","year":"2024","unstructured":"Sam Rogers. 2024. International Scammers Steal Over $1 Trillion in 12 Months in Global State of Scams Report 2024. Global Anti-Scam Alliance. https:\/\/www.gasa.org\/post\/global-state-of-scams-report-2024-1-trillion-stolen-in-12-months-gasa-feedzai Accessed: 2024-01-22."},{"key":"e_1_3_3_1_28_2","unstructured":"Zitong Shen Kangzhong Wang Youqian Zhang Grace Ngai and Eugene\u00a0Y. Fu. 2024. Combating Phone Scams with LLM-based Detection: Where Do We Stand? arxiv:https:\/\/arXiv.org\/abs\/2409.11643\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2409.11643"},{"key":"e_1_3_3_1_29_2","unstructured":"True Software Scandinavia AB. 2024. Truecaller. https:\/\/www.truecaller.com. Mobile application software."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788623"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8853468"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025171.3025219"}],"event":{"name":"CHI EA '25: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI EA '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720263","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3720263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:51Z","timestamp":1750295931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":31,"alternative-id":["10.1145\/3706599.3720263","10.1145\/3706599"],"URL":"https:\/\/doi.org\/10.1145\/3706599.3720263","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}