{"id":"https://openalex.org/W7148543823","doi":"https://doi.org/10.48550/arxiv.2604.00323","title":"Large Language Models in the Abuse Detection Pipeline","display_name":"Large Language Models in the Abuse Detection Pipeline","publication_year":2026,"publication_date":"2026-03-31","ids":{"openalex":"https://openalex.org/W7148543823","doi":"https://doi.org/10.48550/arxiv.2604.00323"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.00323","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00323","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.00323","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083317678","display_name":"Suraj Kath","orcid":"https://orcid.org/0000-0002-4731-5590"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kath, Suraj","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125701012","display_name":"Sanket Badhe","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Badhe, Sanket","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132766436","display_name":"Preet Shah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shah, Preet","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110067273","display_name":"Ashwin Sampathkumar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sampathkumar, Ashwin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5132824225","display_name":"Shivani Gupta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gupta, Shivani","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083317678"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.7188000082969666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.7188000082969666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.028200000524520874,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.026399999856948853,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/operationalization","display_name":"Operationalization","score":0.6898000240325928},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6521999835968018},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.5943999886512756},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.5806000232696533},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5284000039100647},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4975000023841858},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.44920000433921814},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.35420000553131104}],"concepts":[{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.6898000240325928},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6521999835968018},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.5943999886512756},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.5806000232696533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5723999738693237},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5284000039100647},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.49950000643730164},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4975000023841858},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.44920000433921814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38440001010894775},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3569999933242798},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.35420000553131104},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.35089999437332153},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3483000099658966},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.31189998984336853},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.29829999804496765},{"id":"https://openalex.org/C27548731","wikidata":"https://www.wikidata.org/wiki/Q88272","display_name":"Investment (military)","level":3,"score":0.29249998927116394},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.2768000066280365},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.27630001306533813},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25440001487731934},{"id":"https://openalex.org/C123587114","wikidata":"https://www.wikidata.org/wiki/Q2101508","display_name":"Policy analysis","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.2526000142097473},{"id":"https://openalex.org/C2776207758","wikidata":"https://www.wikidata.org/wiki/Q5303302","display_name":"Downstream (manufacturing)","level":2,"score":0.2524000108242035},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.00323","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00323","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.00323","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00323","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.40122416615486145,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Online":[0],"abuse":[1],"has":[2],"grown":[3],"increasingly":[4],"complex,":[5],"spanning":[6],"toxic":[7],"language,":[8],"harassment,":[9],"manipulation,":[10],"and":[11,21,32,49,97,109,118,122,139,141,157],"fraudulent":[12],"behavior.":[13],"Traditional":[14],"machine-learning":[15],"approaches":[16],"dependent":[17],"on":[18],"static":[19],"classifiers":[20],"labor-intensive":[22],"labeling":[23],"struggle":[24],"to":[25,54,147],"keep":[26],"pace":[27],"with":[28],"evolving":[29],"threat":[30],"patterns":[31],"nuanced":[33],"policy":[34,45],"requirements.":[35],"Large":[36],"Language":[37],"Models":[38],"introduce":[39],"new":[40],"capabilities":[41],"for":[42,115],"contextual":[43],"reasoning,":[44],"interpretation,":[46],"explanation":[47],"generation,":[48],"cross-modal":[50],"understanding,":[51],"enabling":[52],"them":[53],"support":[55],"multiple":[56],"stages":[57],"of":[58,68,124,154],"modern":[59],"safety":[60],"systems.":[61,159],"This":[62],"survey":[63],"provides":[64],"a":[65],"lifecycle-oriented":[66],"analysis":[67],"how":[69],"LLMs":[70,149],"are":[71],"being":[72],"integrated":[73],"into":[74],"the":[75,120],"Abuse":[76],"Detection":[77],"Lifecycle":[78],"(ADL),":[79],"which":[80],"we":[81,105],"define":[82],"across":[83],"four":[84],"stages:":[85],"(I)":[86],"Label":[87],"\\&amp;":[88,95,100],"Feature":[89],"Generation,":[90],"(II)":[91],"Detection,":[92],"(III)":[93],"Review":[94],"Appeals,":[96],"(IV)":[98],"Auditing":[99],"Governance.":[101],"For":[102],"each":[103],"stage,":[104],"synthesize":[106],"emerging":[107],"research":[108,144],"industry":[110],"practices,":[111],"highlight":[112],"architectural":[113],"considerations":[114],"production":[116],"deployment,":[117],"examine":[119],"strengths":[121],"limitations":[123],"LLM-driven":[125],"approaches.":[126],"We":[127],"conclude":[128],"by":[129],"outlining":[130],"key":[131],"challenges":[132],"including":[133],"latency,":[134],"cost-efficiency,":[135],"determinism,":[136],"adversarial":[137],"robustness,":[138],"fairness":[140],"discuss":[142],"future":[143],"directions":[145],"needed":[146],"operationalize":[148],"as":[150],"reliable,":[151],"accountable":[152],"components":[153],"large-scale":[155],"abuse-detection":[156],"governance":[158]},"counts_by_year":[],"updated_date":"2026-04-03T16:44:17.987007","created_date":"2026-04-03T00:00:00"}
