{"id":"https://openalex.org/W3211574637","doi":"https://doi.org/10.1109/icccnt51525.2021.9579632","title":"Classification of Fraud Calls by Intent Analysis of Call Transcripts","display_name":"Classification of Fraud Calls by Intent Analysis of Call Transcripts","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3211574637","doi":"https://doi.org/10.1109/icccnt51525.2021.9579632","mag":"3211574637"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021264357","display_name":"Neha Kale","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Neha Kale","raw_affiliation_strings":["Sardar Patel Institute Of Technology, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute Of Technology, Mumbai, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080053773","display_name":"Shivangi Kochrekar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shivangi Kochrekar","raw_affiliation_strings":["Sardar Patel Institute Of Technology, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute Of Technology, Mumbai, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079969178","display_name":"Rishita Mote","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rishita Mote","raw_affiliation_strings":["Sardar Patel Institute Of Technology, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute Of Technology, Mumbai, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039529726","display_name":"Surekha Dholay","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Surekha Dholay","raw_affiliation_strings":["Sardar Patel Institute Of Technology, Mumbai, India"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute Of Technology, Mumbai, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021264357"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.5591,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.91390453,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.943806529045105},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8935831785202026},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243922352790833},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6777619123458862},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6568154096603394},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.6541483402252197},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.6316400170326233},{"id":"https://openalex.org/keywords/phone-call","display_name":"Phone call","score":0.5847887992858887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5614087581634521},{"id":"https://openalex.org/keywords/credit-card-fraud","display_name":"Credit card fraud","score":0.53005051612854},{"id":"https://openalex.org/keywords/conversation","display_name":"Conversation","score":0.4738460183143616},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.424702525138855},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41627490520477295},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34218332171440125},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.284172922372818},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.16010171175003052},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15695339441299438}],"concepts":[{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.943806529045105},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8935831785202026},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243922352790833},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6777619123458862},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6568154096603394},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.6541483402252197},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.6316400170326233},{"id":"https://openalex.org/C2994270382","wikidata":"https://www.wikidata.org/wiki/Q2296401","display_name":"Phone call","level":3,"score":0.5847887992858887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5614087581634521},{"id":"https://openalex.org/C2780747020","wikidata":"https://www.wikidata.org/wiki/Q83873","display_name":"Credit card fraud","level":4,"score":0.53005051612854},{"id":"https://openalex.org/C2777200299","wikidata":"https://www.wikidata.org/wiki/Q52943","display_name":"Conversation","level":2,"score":0.4738460183143616},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.424702525138855},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41627490520477295},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34218332171440125},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.284172922372818},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.16010171175003052},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15695339441299438},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1989829258","https://openalex.org/W2139565456","https://openalex.org/W2160726788","https://openalex.org/W2584824518","https://openalex.org/W2606751384","https://openalex.org/W2765340726","https://openalex.org/W2889523482","https://openalex.org/W2898474357","https://openalex.org/W2920827296","https://openalex.org/W2936503027","https://openalex.org/W2956699707","https://openalex.org/W2957888014","https://openalex.org/W2965465659","https://openalex.org/W3046140617","https://openalex.org/W3090717071","https://openalex.org/W3157247077","https://openalex.org/W6766826133"],"related_works":["https://openalex.org/W2794575345","https://openalex.org/W2334141798","https://openalex.org/W4375830807","https://openalex.org/W3200671490","https://openalex.org/W3046058513","https://openalex.org/W4313492216","https://openalex.org/W4387790435","https://openalex.org/W2183312460","https://openalex.org/W2982309254","https://openalex.org/W2731458439"],"abstract_inverted_index":{"While":[0],"the":[1,92,112,115,119,145],"rapid":[2],"growth":[3],"of":[4,50,73,131,154],"technology":[5],"makes":[6],"life":[7],"easier":[8],"for":[9,54],"consumers":[10],"it":[11],"has":[12],"also":[13],"brought":[14],"new":[15,82],"threats":[16],"along":[17],"with":[18],"it.":[19],"People":[20],"can":[21],"be":[22],"duped":[23],"to":[24,64,127],"reveal":[25],"sensitive":[26],"data":[27],"such":[28,41,55],"as":[29],"banking":[30],"and":[31,38,118,138,149,156],"credit":[32],"card":[33],"details,":[34],"personally":[35],"identifiable":[36],"information,":[37],"passwords.":[39],"One":[40],"technique":[42],"is":[43,57],"phishing":[44,66],"through":[45],"phone":[46],"calls.":[47],"The":[48,61,141],"number":[49],"people":[51],"who":[52],"fall":[53],"scams":[56],"an":[58,152],"astounding":[59],"figure.":[60],"conventional":[62],"approach":[63],"detecting":[65],"call":[67,109,132],"fraud":[68,75],"depends":[69],"on":[70,144],"a":[71,79,102,107],"blacklist":[72],"known":[74],"numbers.":[76],"This":[77],"creates":[78],"problem":[80],"when":[81],"numbers":[83,85],"or":[84],"which":[86],"have":[87,151],"not":[88],"been":[89],"encountered":[90],"by":[91,110],"system":[93,103],"before":[94],"are":[95],"used.":[96],"To":[97],"solve":[98],"this,":[99],"we":[100],"propose":[101],"that":[104],"will":[105],"classify":[106],"fraudulent":[108],"analyzing":[111],"conversation":[113],"between":[114],"potential":[116],"victim":[117],"caller.":[120],"We":[121,134],"used":[122],"various":[123],"machine":[124],"learning":[125],"techniques":[126],"perform":[128],"intent":[129],"analysis":[130],"transcripts.":[133],"created":[135],"two":[136],"models":[137,142],"compared":[139],"them.":[140],"based":[143],"Naive":[146],"Bayes":[147],"Algorithm":[148],"CNN":[150],"accuracy":[153],"94.57%":[155],"97.21":[157],"%":[158],"respectively.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
