{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:N22L4KFXMX2BFO5HOLPBM36LEJ","short_pith_number":"pith:N22L4KFX","schema_version":"1.0","canonical_sha256":"6eb4be28b765f412bba772de166fcb2265e7def75b1b87386f2480821bb6a16a","source":{"kind":"arxiv","id":"1710.05305","version":1},"attestation_state":"computed","paper":{"title":"Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CY"],"primary_cat":"cs.CR","authors_text":"Chia-Mu Yu, Hung-Yu Kao, TonTon Hsien-De Huang","submitted_at":"2017-10-15T09:50:53Z","abstract_excerpt":"The advance of smartphones and cellular networks boosts the need of mobile advertising and targeted marketing. However, it also triggers the unseen security threats. We found that the phone scams with fake calling numbers of very short lifetime are increasingly popular and have been used to trick the users. The harm is worldwide. On the other hand, deceptive advertising (deceptive ads), the fake ads that tricks users to install unnecessary apps via either alluring or daunting texts and pictures, is an emerging threat that seriously harms the reputation of the advertiser. To counter against the"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1710.05305","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-10-15T09:50:53Z","cross_cats_sorted":["cs.CY"],"title_canon_sha256":"6a6a67577a95fb1f12228b9dc0fe34caa087f133f3c905c6d693a27902b9e23a","abstract_canon_sha256":"cb22e7603b3f7e292119b024e5f296b1e9f26321af0fac2c458bb60a2b9bcf6e"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:32:51.590457Z","signature_b64":"sZcTtvGHQ4Vj6C68qBqV3Yh4BYCxCixSaCv86z9gaBaO8/fXK5le6ZeU3KgUngA0hRXGKQ0WIL+HbfYPJd/ZCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"6eb4be28b765f412bba772de166fcb2265e7def75b1b87386f2480821bb6a16a","last_reissued_at":"2026-05-18T00:32:51.589947Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:32:51.589947Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CY"],"primary_cat":"cs.CR","authors_text":"Chia-Mu Yu, Hung-Yu Kao, TonTon Hsien-De Huang","submitted_at":"2017-10-15T09:50:53Z","abstract_excerpt":"The advance of smartphones and cellular networks boosts the need of mobile advertising and targeted marketing. However, it also triggers the unseen security threats. We found that the phone scams with fake calling numbers of very short lifetime are increasingly popular and have been used to trick the users. The harm is worldwide. On the other hand, deceptive advertising (deceptive ads), the fake ads that tricks users to install unnecessary apps via either alluring or daunting texts and pictures, is an emerging threat that seriously harms the reputation of the advertiser. To counter against the"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1710.05305","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1710.05305","created_at":"2026-05-18T00:32:51.590032+00:00"},{"alias_kind":"arxiv_version","alias_value":"1710.05305v1","created_at":"2026-05-18T00:32:51.590032+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1710.05305","created_at":"2026-05-18T00:32:51.590032+00:00"},{"alias_kind":"pith_short_12","alias_value":"N22L4KFXMX2B","created_at":"2026-05-18T12:31:31.346846+00:00"},{"alias_kind":"pith_short_16","alias_value":"N22L4KFXMX2BFO5H","created_at":"2026-05-18T12:31:31.346846+00:00"},{"alias_kind":"pith_short_8","alias_value":"N22L4KFX","created_at":"2026-05-18T12:31:31.346846+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ","json":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ.json","graph_json":"https://pith.science/api/pith-number/N22L4KFXMX2BFO5HOLPBM36LEJ/graph.json","events_json":"https://pith.science/api/pith-number/N22L4KFXMX2BFO5HOLPBM36LEJ/events.json","paper":"https://pith.science/paper/N22L4KFX"},"agent_actions":{"view_html":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ","download_json":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ.json","view_paper":"https://pith.science/paper/N22L4KFX","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1710.05305&json=true","fetch_graph":"https://pith.science/api/pith-number/N22L4KFXMX2BFO5HOLPBM36LEJ/graph.json","fetch_events":"https://pith.science/api/pith-number/N22L4KFXMX2BFO5HOLPBM36LEJ/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ/action/timestamp_anchor","attest_storage":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ/action/storage_attestation","attest_author":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ/action/author_attestation","sign_citation":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ/action/citation_signature","submit_replication":"https://pith.science/pith/N22L4KFXMX2BFO5HOLPBM36LEJ/action/replication_record"}},"created_at":"2026-05-18T00:32:51.590032+00:00","updated_at":"2026-05-18T00:32:51.590032+00:00"}