{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:43:28Z","timestamp":1769726608074,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","funder":[{"name":"the Hong Kong Research Grant Council","award":["Grant 15600219"],"award-info":[{"award-number":["Grant 15600219"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3758164","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T05:44:48Z","timestamp":1761371088000},"page":"12381-12389","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["One Size Fits All? A Modular Adaptive Sanitization Kit (MASK) for Customizable Privacy-Preserving Phone Scam Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6267-0016","authenticated-orcid":false,"given":"Kangzhong","family":"Wang","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4950-0627","authenticated-orcid":false,"given":"Zitong","family":"Shen","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0907-7998","authenticated-orcid":false,"given":"Youqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3591-9089","authenticated-orcid":false,"given":"Michael MK","family":"Cheung","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2027-168X","authenticated-orcid":false,"given":"Grace","family":"Ngai","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1048-1904","authenticated-orcid":false,"given":"Eugene Yujun","family":"Fu","sequence":"additional","affiliation":[{"name":"The Education University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.trustnlp-1.2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.trustnlp-1.14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Hannah Brown Katherine Lee Fatemehsadat Mireshghallah Reza Shokri and Florian Tram\u00e8r. 2022. What Does it Mean for a Language Model to Preserve Privacy? arXiv:2202.05520 [stat.ML] https:\/\/arxiv.org\/abs\/2202.05520","DOI":"10.1145\/3531146.3534642"},{"key":"e_1_3_2_1_4_1","volume-title":"What Does it Mean for a Language Model to Preserve Privacy? arXiv preprint arXiv:2202.12345","author":"Brown Matthew","year":"2022","unstructured":"Matthew Brown and Andrew Trask. 2022. What Does it Mean for a Language Model to Preserve Privacy? arXiv preprint arXiv:2202.12345 (2022)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2022.03.028"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4236\/psych.2023.1411101"},{"key":"e_1_3_2_1_7_1","volume-title":"Extracting Training Data from Large Language Models. arXiv preprint arXiv:2012.07805","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tram\u00e8r, and Eric Wallace. 2021. Extracting Training Data from Large Language Models. arXiv preprint arXiv:2012.07805 (2021)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977653.ch99"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2412.08680"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2412.00621"},{"key":"e_1_3_2_1_11_1","volume-title":"Exposing LLM Vulnerabilities: Adversarial Scam Detection and Performance. In 2024 IEEE International Conference on Big Data (BigData). IEEE, 3568-3571","author":"Chang Chen-Wei","year":"2024","unstructured":"Chen-Wei Chang, Shailik Sarkar, Shutonu Mitra, Qi Zhang, Hossein Salemi, Hemant Purohit, Fengxiu Zhang, Michin Hong, Jin-Hee Cho, and Chang-Tien Lu. 2024b. Exposing LLM Vulnerabilities: Adversarial Scam Detection and Performance. In 2024 IEEE International Conference on Big Data (BigData). IEEE, 3568-3571."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.355"},{"key":"e_1_3_2_1_13_1","volume-title":"Forty-first International Conference on Machine Learning.","author":"Chiang Wei-Lin","year":"2024","unstructured":"Wei-Lin Chiang, Lianmin Zheng, Ying Sheng, Anastasios Nikolas Angelopoulos, Tianle Li, Dacheng Li, Banghua Zhu, Hao Zhang, Michael Jordan, Joseph E Gonzalez, et al., 2024. Chatbot arena: An open platform for evaluating llms by human preference. In Forty-first International Conference on Machine Learning."},{"key":"e_1_3_2_1_14_1","unstructured":"Alibaba Cloud. 2025. Qwen2.5-MAX: An Advanced Multimodal AI Model for General and Specialized Tasks. Technical Report. Alibaba Cloud Hangzhou China. Available at https:\/\/www.alibabacloud.com\/en\/product\/qwen."},{"key":"e_1_3_2_1_15_1","unstructured":"Google DeepMind. 2025. Gemini-2.5-Flash: A High-Performance Language Model for Reasoning and Multimodal Tasks. Technical Report. Google DeepMind London UK. Available at https:\/\/deepmind.google\/technologies\/gemini."},{"key":"e_1_3_2_1_16_1","unstructured":"DeepSeek. 2024. DeepSeek-V3: A Large-Scale Open-Source Language Model for Specialized Applications. Technical Report. DeepSeek Beijing China. Available at https:\/\/www.deepseek.com."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/gby151"},{"key":"e_1_3_2_1_18_1","volume-title":"spaCy 2: Natural language understanding with Bloom embeddings, convolutional neural networks and incremental parsing. (No Title)","author":"Honnibal Matthew","year":"2017","unstructured":"Matthew Honnibal. 2017. spaCy 2: Natural language understanding with Bloom embeddings, convolutional neural networks and incremental parsing. (No Title) (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.07.020"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2024.3352978"},{"key":"e_1_3_2_1_21_1","volume-title":"Do awareness campaigns reduce financial fraud? European Journal on Criminal Policy and Research","author":"Tuffveson Jensen Rasmus Ingemann","year":"2024","unstructured":"Rasmus Ingemann Tuffveson Jensen, Julie Gerlings, and Joras Ferwerda. 2024. Do awareness campaigns reduce financial fraud? European Journal on Criminal Policy and Research (2024), 1-36."},{"key":"e_1_3_2_1_22_1","volume-title":"DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts. arXiv preprint arXiv:2404.09876","author":"Johnson Alice","year":"2024","unstructured":"Alice Johnson and Bob Brown. 2024. DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts. arXiv preprint arXiv:2404.09876 (2024)."},{"key":"e_1_3_2_1_23_1","unstructured":"Haoran Li Yulin Chen Jinglong Luo Jiecong Wang Hao Peng Yan Kang Xiaojin Zhang Qi Hu Chunkit Chan Zenglin Xu Bryan Hooi and Yangqiu Song. 2024a. Privacy in Large Language Models: Attacks Defenses and Future Directions. arXiv:2310.10383 [cs.CL] https:\/\/arxiv.org\/abs\/2310.10383"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3643983"},{"key":"e_1_3_2_1_25_1","volume-title":"Prompt Injection Attacks on Large Language Models: A Survey. arXiv preprint arXiv:2310.09876","author":"Liu Kai","year":"2023","unstructured":"Kai Liu and Wei Chen. 2023. Prompt Injection Attacks on Large Language Models: A Survey. arXiv preprint arXiv:2310.09876 (2023)."},{"key":"e_1_3_2_1_26_1","volume-title":"TeleAntiFraud-28k: An Audio-Text Slow-Thinking Dataset for Telecom Fraud Detection. arXiv preprint arXiv:2503.24115","author":"Ma Zhiming","year":"2025","unstructured":"Zhiming Ma, Peidong Wang, Minhua Huang, Jingpeng Wang, Kai Wu, Xiangzhao Lv, Yachun Pang, Yin Yang, Wenjie Tang, and Yuchen Kang. 2025. TeleAntiFraud-28k: An Audio-Text Slow-Thinking Dataset for Telecom Fraud Detection. arXiv preprint arXiv:2503.24115 (2025)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2580509"},{"key":"e_1_3_2_1_28_1","unstructured":"OpenAI. 2024. ChatGPT-4o: A Multimodal Large Language Model. Technical Report. OpenAI San Francisco CA USA. Available at https:\/\/openai.com\/chatgpt."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2018.00025"},{"key":"e_1_3_2_1_30_1","volume-title":"Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084","author":"Reimers Nils","year":"2019","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084 (2019)."},{"key":"e_1_3_2_1_31_1","volume-title":"Scams Report","author":"Rogers Sam","year":"2024","unstructured":"Sam Rogers. 2024. International Scammers Steal Over $1 Trillion in 12 Months in Global State of Scams Report 2024. Global Anti-Scam Alliance. https:\/\/www.gasa.org\/post\/global-state-of-scams-report-2024-1-trillion-stolen-in-12-months-gasa-feedzai Accessed: 2025-05-30."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i28.35298"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3720263"},{"key":"e_1_3_2_1_34_1","volume-title":"Casper: Prompt Sanitization for Protecting User Privacy in Web-Based Large Language Models. arXiv preprint arXiv:2405.12345","author":"Smith John","year":"2024","unstructured":"John Smith and Jane Doe. 2024. Casper: Prompt Sanitization for Protecting User Privacy in Web-Based Large Language Models. arXiv preprint arXiv:2405.12345 (2024)."},{"key":"e_1_3_2_1_35_1","volume-title":"Raising public awareness of consumer fraud in Australia. Trends & Issues in Crime & Criminal Justice, 349","author":"Smith Russell G","year":"2008","unstructured":"Russell G Smith and Tabor Akman. 2008. Raising public awareness of consumer fraud in Australia. Trends & Issues in Crime & Criminal Justice, 349 (2008)."},{"key":"e_1_3_2_1_36_1","volume-title":"A statistical interpretation of term specificity and its application in retrieval","author":"Jones Karen Sparck","unstructured":"Karen Sparck Jones. 1988. A statistical interpretation of term specificity and its application in retrieval. Taylor Graham Publishing, GBR, 132-142."},{"key":"e_1_3_2_1_37_1","unstructured":"True Software Scandinavia AB. 2024. Truecaller. https:\/\/www.truecaller.com. Mobile application software."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788623"},{"key":"e_1_3_2_1_39_1","first-page":"1327","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Tu Huahong","year":"2019","unstructured":"Huahong Tu, Adam Doup\u00e9, Ziming Zhao, and Gail-Joon Ahn. 2019. Users really do answer telephone scams. In 28th USENIX Security Symposium (USENIX Security 19). 1327-1340."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.566"},{"key":"e_1_3_2_1_41_1","volume-title":"On Protecting the Data Privacy of Large Language Models (LLMs) and LLM Agents: A Literature Review. arXiv preprint arXiv:2501.09876","author":"Wang Li","year":"2025","unstructured":"Li Wang and Ming Zhao. 2025. On Protecting the Data Privacy of Large Language Models (LLMs) and LLM Agents: A Literature Review. arXiv preprint arXiv:2501.09876 (2025)."},{"key":"e_1_3_2_1_42_1","unstructured":"An Yang Anfeng Li Baosong Yang Beichen Zhang Binyuan Hui Bo Zheng Bowen Yu Chang Gao Chengen Huang Chenxu Lv et al. 2025. Qwen3 technical report. arXiv preprint arXiv:2505.09388 (2025)."},{"key":"e_1_3_2_1_43_1","volume-title":"Security and Privacy Challenges of Large Language Models: A Survey. arXiv preprint arXiv:2402.12345","author":"Zhang Ye","year":"2024","unstructured":"Ye Zhang and Xinjian Li. 2024. Security and Privacy Challenges of Large Language Models: A Survey. arXiv preprint arXiv:2402.12345 (2024)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713701"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","location":"Dublin Ireland","acronym":"MM '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3758164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:17:12Z","timestamp":1765307832000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3758164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":45,"alternative-id":["10.1145\/3746027.3758164","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3758164","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}