0% found this document useful (0 votes)
15 views15 pages

Research Paper 2

The document outlines the UGC Sponsored National Conference on Recent Advancements in Science and Technology, specifically focusing on Electronics, Computer Science, and Applications. It includes details about the organizing institutions, editorial board, and a comprehensive list of research papers presented at the conference scheduled for February 10, 2024. The proceedings are published by Sai Jyoti Publication and include various topics related to advancements in technology and their applications.

Uploaded by

Priyanka Tikekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views15 pages

Research Paper 2

The document outlines the UGC Sponsored National Conference on Recent Advancements in Science and Technology, specifically focusing on Electronics, Computer Science, and Applications. It includes details about the organizing institutions, editorial board, and a comprehensive list of research papers presented at the conference scheduled for February 10, 2024. The proceedings are published by Sai Jyoti Publication and include various topics related to advancements in technology and their applications.

Uploaded by

Priyanka Tikekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

UGC Sponsored

National Conference on

Recent Advancements in
Science and Technology
VOLUME IV : Electronics, Computer Science & Application

:: Organized by ::

Vidya Bharati Shaikshanik Mandal's

Vidya Bharati Mahavidyalaya, Amravati


Re-accredited with Grade 'A' by the NAAC (CGPA 3.23 - Third Cycle)
College with Potential for Excellence (CPE Status Thrice by the UGC)
Star College Status by DBT, New Delhi, Mentor College under Paramarsh by UGC
Identified as Lead College by S.G.B. Amravati University, Amravati

:: In Collaboration with ::

S.S.S.K.R. Innani Mahavidyalaya


Karanja (Lad), Dist. Washim 444105 (M.S.), India
NAAC Re-Accredoted 'A+' Grade (CGPA 3.28)
C.P.E. Status Awarded by UGC, New Delhi
Affiliated to Sant Gadge Baba Amravati University, Amravati

ISBN : 978-81-19931-25-5
UGC Sponsored
National Conference on

Recent Advancements in
Science and Technology

VOLUME IV : Electronics, Computer Science & Application

:: Organized by ::

Vidya Bharati Shaikshanik Mandal's

Vidya Bharati Mahavidyalaya, Amravati


Re-accredited with Grade 'A' by the NAAC (CGPA 3.23 - Third Cycle)
College with Potential for Excellence (CPE Status Thrice by the UGC)
Star College Status by DBT, New Delhi, Mentor College under Paramarsh by UGC
Identified as Lead College by S.G.B. Amravati University, Amravati

:: In Collaboration with ::

S.S.S.K.R. Innani Mahavidyalaya


Karanja (Lad), Dist. Washim 444105 (M.S.), India
NAAC Re-Accredoted 'A+' Grade (CGPA 3.28)
C.P.E. Status Awarded by UGC, New Delhi
Affiliated to Sant Gadge Baba Amravati University, Amravati

SAI JYOTI PUBLICATION, NAGPUR


UGC Sponsored
National Conference on
===============================================
Recent Advancements in Science and Technology
===============================================
VOLUME IV : Electronics, Computer Science & Application
===============================================

Chief Editor
Dr. Pradnya S. Yenkar
Principal, Vidya Bharati Mahavidyalaya, Amravati

ISBN : 978-81-19931-25-5
th
Date : 10 Feb., 2024

Publisher :
Sai Jyoti Publication
Itwari, Nagpur
E-mail : [email protected]

Type Setting & Printing


LASER POINT,
Gadge Nagar, Amravati

No part of this book shall be reproduced, stored in retrieval system, or translated in


any form or by any means, electronic, mechanical, photocopying and/or otherwise
without the prior written permission of the publishers.

Disclaimer :
The publishers, The Principal, Vidyabharti Mahavidyalaya, Amravati and
the organizers are not responsible for the content of any of the research
paper/article published in this conference proceedings.
The authors/Co-authors are responsible for the plagiarism
For any conflict of interests, the Author/Co-Authors are responsible.
For any query/issue/ethical aspects contact the corresponding Author.
CONFERENCE PROCEEDINGS
UGC Sponsored National Conference on
Recent Advancements in Science & Technology

Date : 10th Feb, 2024

:: Organized by ::
Vidya Bharati Shaikshanik Mandal's
Vidya Bharati Mahavidyalaya, Amravati
:: In Collaboration with ::
S.S.S.K.R. Innani Mahavidyalaya
Karanja (Lad), Dist. Washim 444105 (M.S.), India

Editorial Board
VOLUME IV : Electronics, Computer Science & Application

Chief Editor

Dr. Pradnya S. Yenkar


Principal,
Vidya Bharati Mahavidyalaya, Amravati

Editors

Electronics Computer Science and


Application

Dr. R. J. Gajbe, Associate Editor Prof. Ather Iqbal, Associate Editor


Ms. K. D. Bhanang, Member Prof. V. N. Mohod, Member
Mr. Anup Yenkar, Member Dr. S. R. Thakare, Member
Mr. N. R. Bundile, Member Dr. Shilpa B. Sarvaiya, Member
Prof. Deven M. Kene, Member
Prof. Shital M. Mohod, Member
Prof. Dipika S. Harode, Member
Prof. P. M. Ingle, Member
.
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

CONTENTS
Electronic Technology
S.No. Title Author/s Page No.
1 Integrated Fuzzy Logic Controller P. A. Saudagar 1-4
for Temperature Control P. V. Tekade
S. H. Bagade
2 Comprehensive Study of E-Waste Prof. Dr. Gajanan S. Wajire 5-7
Hazards and Its Management

3 Iris Detection by using Artificial Dr.R. D. Chaudhari 8-13


Intelligence

4 Design of Node MCU based Data R.K.Parate 14-17


Logger System K.M.Dhole
S.J.Sharma
5 Exploring Innovations in Sensor K. Y. Rokde 18-23
Technologies for Enhanced S. S.Shende
Healthcare Monitoring Systems: A
Comprehensive Analysis
6 An IoT Application- Wireless Water Miss. Teesha Das 24-28
Tank Meter Using Ultrasonic Sensor Miss. Aastha Orkey

7 Artificial Intelligence in R. J. Gajbe 29-33


Agriculture: An Analytical Study C. R. Chaudhari
A. R. Yenkar
N. R. Bundile
K. D. Bhanang
8 A Study on Covid -19 Classification Siddharth K. Ganvir 34-37
From X-Ray Images With Machine Dr.G. K. Reddy
Learning
9 AGNIRAKSHAK: Raspberry Pi Siddharth K. Ganvir 38-41
based fully Robust fire Sensing & Dr.S.P.Deshpande
Protection System Dr.G. K. Reddy
10 Ladder Logic Diagram – A PLC Mr. A. G. Kshirsagar 42-46
Programming Method for Dr. G. D. Agrahari
Automation Dr. D. S. Dhote
Mr. M. C. Naidu
11 Third Eye : Arduino Based Aid for Mr. Nilesh R. Bundile 47-51
Blind Mr. Chandrakant R.
Chaudhari
Dr. Rajani J. Gajbe
12 Wireless E-Notice Board using gsm Anup R. Yenkar 52-58
& at mega 328 Dr. Rajani J. Gajbe
Chandrakant R. Chaudhari
Nilesh R. Bundile
Kirti D. Bhanang
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

13 Water Quality Monitoring Using Ms. Bhagyashri Bhuyar 59-66


Atmega 328PU Mr. Chandrakant R.
Chaudhari
14 Utilization and Generation of Mr. Chandrakant R. 67-71
Hydropower for Welfare in Chaudhari
Agricultural Sector Dr. Giridhar K. Reddy

*****
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

CONTENTS
Computer Science & Application
S.No. Title Author/s Page No.
1 A Study on the Fog- Edge-Cloud Prof. Ather Iqbal 1-9
Computing based IoT (FECIoT): Dr. C. H. Sawarkar
Architecture, Security, and Privacy Dr. Shilpa S. Sarvaiya
Issues
2 IoT Node Security Attacks on Dr.Shilpa B.Sarvaiya 10-15
Device Layer: Attacks Detection Dr.D.N.Satange
Countermeasures and Solutions Dr. A. A. Tayade
3 Various Approaches for Content Deven M. Kene 16-20
Extraction from Web Pages based Ather Iqbal
on Factors
4 Overview and Classification of Mrs. Shital M. Mohod 21-27
Social Security Attacks using Prof. Ather Iqbal
Online Social Networking for
Rumour Blocking
5 Big Data: Security and Security Miss. Dipika S. Harode 28-33
Challenges
6 Challenges in Devanagari Script- Anita B. Dube 34-39
based CAPTCHA: A
Comprehensive Analysis
7 Stress Detection using Machine Mrs. M. M. Mohod 40-43
Learning Techniques Dr. P.M. Jawandiya
8 IoT Based- Soil Salinity Mapping Dr. Avinash B. Kadam 44-50
and Smart Crop Recommendation Miss. Shubhangi D. Falke
System
9 Big Data Analytics In Health Prof. Rana Afreen 51-59
Care: A Reviewpaper Sheikh
Prof. S. K. Totade
10 Study of Software Vulnerabilities Mr. Y. V. Hushare 60-63
Detection Tools and Techniques Dr. Sudhir B. Jagtap
Dr. U. S. Junghare

11 Trends in Recommendation Engine: Sachin N. Joshi 64-68


A Systematic Review Vivek A. Manwar
Dr. A. B. Manwar
12 Machine Learning Tools for Data Sagar A. Durge 69-74
Science: A Review Dr. Kishor M. Dhole
13 A Python Approach For Information Narendra. M. Jathe 75-82
Retrieval Using Vector Space Model
(VSM)
14 Model-Driven Design of Graph Bhushan Jalamkar 83-87
Databases Dr.S.R.Thakare
15 Artificial Intelligence for Genetic Bobade A D 88-93
Mutation Detection and its Bhonde M M
applications Ingle S G
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

16 A Research on Cloud Computing Miss Bhavana K. Bhagat 94-97


17 Impact of Hadoop Technology in Prof. Sameena A.Kazi 98-104
Cloud Computing
18 Internet of Things: Applications and Miss. Ankita Suresh 105-109
Security Challenges Chambatkar
Miss. Nikita Sakharam
Dhande
Prof. S. M Mohod
19 Introduction to Artificial Mr. V. N. Mohod 110-115
Intelligence & Its Applications Mr. A. S. Deshmukh
20 Study of Wireless Communication Ms. Vaishnavi T. Chore 116-120
Technologies with IoT Prof. V.N.Mohod
21 Role of Nanotechnology and Ms. Mayuri A. Deshmukh 121-130
Artificial Intelligence in aroma
22 Using UML in Software Mrs. Anjali R . Shanke 131-140
Requirement Analysis (Jadhav)
Case Study of Academic
Organization as an Example
23 Artificial Intelligence and it’s Prof. Pratik S. Yawale 141-144
Applications Prof. Devendra G. Ingale
24 Cyber Security Awareness on Cyber Aparna R.Sapate 145-150
Attacks
25 IOT Based Vehicle Speed Control Prof. Devendra G. Ingale 151-154
by Using Mobile Prof. Pratik S. Yawale
26 Word Sense Disambiguation for Vivek A. Manwar 155-158
Marathi Language in Cross Rita L. Gupta
Language Information Retrieval Dr. A. B. Manwar
27 Machine Learning Applications: A Ms. Vaishnavi S. Karale 159-163
Comprehensive Overview of Dr. Priyanka C. Tikekar
Techniques and Working
Mechanisms
28 Intricacies of VR Features in Dr. Bhargavi S. 164-168
graphic designing Chinchmalatpure
Mr.Pratik Vilas Dabherao
29 Review Paper on Characteristics, Miss. Sidhdee Satish Gurjar 169-173
Benefits and Challenges in Cloud Miss. Adika B. Thakare
Computing Prof. D. M. Kene
30 A Review on Big Data Challenges Kavita Kishor Yadav 174-179
and Hadoop Technology
31 A Review on Internet of Things Mithilesh M. Wasu 180-184
(IoT) Sensors Dr. Kishor M. Dhole
32 A Survey on Predictive Analysis of Ms. Sheetal M. Yawalkar 185-192
Social Media Data Using Machine Prachi Mawale
Learning Algorithm
33 A Systematic approach for Ms. Ashwini S. Kaware 193-196
Challenges and Preventive Measures
for Machine learning technology
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

34 Artificial Intelligence: Advanced Miss.Shrutika Ramesh 197-201


Analysis and Design Dharamkar
Miss.Gopika Shyambabu
Ghare
Miss.Aparna R. Sapate
35 Disconnected Realities: Unveiling Nitin Babaraoji Vasu 202-205
the Challenges and Impact of
Network Issues in Mobile
Computing
36 HTML5 in Web Development Varun Sanjay Shende 206-208
37 Itemized Selection of Appropriate Prof. V. M. Jawade 209-212
Image Steganography Method Prof. R. R. Bhale
38 Impact of Skill enhancement Ravisha R. Ambekar 213-217
Programme on Developing
Multimedia Tools for Innovative
Learning Solution
39 IoT-based Automated Smart Dr. Avinash B. Kadam 218-222
Irrigation System Using Sensors for Mr. Chandrakant R. Patorkar
Farming Miss. Shubhangi D. Falke
40 Data Mining Algorithms Analysis Sushilkumar R. Kalmegh 223-229
on Weka for Disease Classification Prerna S. Tayade
41 Cloud Computing: Types, Security Miss. Rutuja Naresh 230-234
Issues, Benefits Turkhade
Miss. Nirja Vinod Deshmukh
Dr. Shilpa B. Sarvaiya
42 Pre-Processing techniques Using Priya Janardhan Deshmukh 235-239
Weka Tool
43 Web Data Mining: A Ms. Anjali V. Parasmode 240-243
Comprehensive Analysis of Types, Dr. Sonali R. Chavan
Tools, and Techniques

44 Feature Analysis of Fake News: Pooja. G. Borkar 244-248


Improving Fake News
Detection on Social Media
45 Role of Internet of Things in Rashmi A.Charjan 249-252
Disease of Pate and Remote Dr.Ajit Kumar
Monitoring System Dr.G.K.Reddy
46 Security IoT Device Against Madhumita Y. Sugandhi 253-262
Emerging Security Threats:
Challenges and Solution Techniques
47 Using Machine Learning to Enhance Ms. Varkha K. Jewani 263-268
Security Measures at the Network (Ms. Pragati V. Thawani)
Layer of IoT Dr. Prafulla E. Ajmire
Ms. Geeta N. Brijwani
48 The Role of chatGPT and other Mr.Anup Satishrao Bele 269-271
Artificial intelligent in the field of
Renewable Energy and sustainable
Energy
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

49 An In-Depth Exploration of AI in Ms. Rhutika V. Jawarkar 272-275


the Digital Age- A Focus on Scams Dr. Priyanka C. Tikekar
and Frauds in the Introduction Phase
50 Biometric Authentication & its Prof.S.B.Bele 276-280
Security Purposes Prof. K.P. Raghuvanshi
51 Importance of Cyber Security and Mrs. Rekha N. Yeotikar 281-285
Cyber Security Tips
52 A Survey on Blockchain Jaykumar Meshram 286-290
Technology Concepts, Applications Dr. Dinesh Satange
and Security Issues Dr.Swapnil Deshpande
53 A survey on face detection Prof.Amit B.Rehapade 291-295
techniques using deep learning Dr P. E. Ajmire
Kiran H. Varma
54 A Deep Dive Into Extended Reality Miss. Sidra-tul-munteha 296-300
-Six Sense Integration-Merging Real mohd Sabir
And Virtual World Miss. Afifa gulam ahmad
Saudagar
Prof. Dipika S.Harode
55 Cyber Security: Hacking, Child Miss. Gayatri Dilip Wange 301-305
Pornography, Virus Dissminition Miss. Diksha Laxman
Pandey
Miss. Mayuri Arun
Deshmukh
56 Novel Design and Implementation Mr. K.P.Raghuvanshi 306-310
of the Personalized Search Engine in
Context with User Keywords Profile
and Keywords Optimization
Technique
57 How biometric affects Cyber Miss. Vaishnavi 311-314
Security Govardhanrao Dhole
Miss. Sakshi Sanjay Rathi
Prof. Dr.Shilpa B.Sarvaiya
58 Analyzing the Challenges ofMarathi Ram B. Ghayalkar 315-319
Textual Data for Sentiment Analysis Prof. Dr. D. N. Besekar
59 Biometric its application and Aloksingh M. Thakur 320-321
challenges in Internet of Things Chandrakant R. Mankar
Dr. V. M. Patil
Dr. D.N. Satange
60 Automatic Sparse Dr. A.A. Tayade 322-326
Representation for Classification Prof. P.M. Ingle
of Echocardiographically
Detected Intracardiac Masses
61 EEG Signal Processing for Fetus Dr. N.D. Jambhekar 327-331
and Mother Using MATLAB using Dr. R.K. Nawasalkar
Image Processing

*****
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

49

An In-Depth Exploration of AI in the Digital Age- A Focus on Scams and


Frauds in the Introduction Phase

Ms. Rhutika V. Jawarkar


Department of Computer Science, Bharatiya Mahavidyalaya, Amravati, MS, India
[email protected]

Dr. Priyanka C. Tikekar


Department of Computer Science, Bharatiya Mahavidyalaya, Amravati, MS, India
[email protected]

Abstract-
This study explores sneaky tricks used in artificial intelligence (AI) scams, revealing how bad
actors cleverly misuse AI for scams. As AI becomes more widespread, the dark side of using
smart technology for dishonest activities is also growing, putting people, businesses, and online
security in danger. The research looks into secret networks and places where these AI scams
are planned and carried out. It emphasizes the importance of better online security and
teamwork between countries to tackle these global threats. The paper also talks about the
ethical problems linked to using AI for scams, making people more aware of the potential harm
caused by misusing powerful technologies. paper provides helpful information about the
changing world of AI-driven scams. It lays the groundwork for creating strong defenses and
rules to protect people and organizations from the increasing dangers caused by those who
misuse artificial intelligence.

Keywords- Artificial intelligence, AI scams, frauds

I. INTRODUCTION
Artificial Intelligence is a technology that allows machines to think and act like humans. It
helps them learn, solve problems, and do various tasks. AI has brought many advantages in
industries like technology, banking, marketing, and entertainment. For example, it's used in
driving cars, setting fitness goals on smartwatches, suggesting songs and shows on streaming
services, and planning the best travel routes with map apps [1]. However, there's a downside.
Scammers are using AI in a tricky way. They gather personal information from social media
and other online sources. Then, they use this info with AI to customize scam texts and emails.
This makes the scams look real and harder to spot as fake. Scammers are playing a big game,
and people can easily fall into their traps [2].

II. ARTIFICIAL INTELLIGENCE SCAMS


Artificial Intelligence (AI) refers to the development of computer systems that can perform
tasks that typically require human intelligence. These tasks include learning, reasoning,
problem-solving, perception, language understanding, and decision-making. The goal of AI is
to create machines that can mimic and replicate human cognitive functions, ultimately
achieving a level of intelligence and problem-solving capability comparable to or beyond that
of humans. Artificial Intelligence, makes it simpler for scammers to create scams. They use
different techniques to trick people. Scammers make scams that involve personal information,

272
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

money, and banking frauds. They play tricks to trap unsuspecting individuals. Some AI scams
are discussed below [3].

A. Generating text and image content


Using AI, scammers can make personalized emails, instant messages, and images to trick
people. They use these to lure victims into scams like phishing or fraudulent advertisements.
Traditional signs of scams, like bad spelling and grammar, can be fixed using AI, making scams
harder to spot [4]. AI can also be used to create fake images, like pictures of damaged cars or
property, to support fake insurance claims. While some AI tools have safety features, our
research found that scammers can bypass them. People we talked to in our research think this
threat is already a big problem and will keep growing [5].

B. AI enabled chatbots
Some organizations talked to have found proof that clever chatbots, possibly using AI, are
talking to potential scam victims. They try to manipulate people into paying money. In some
cases, scammers purposely ask confusing questions in chats to gather information. This leads
to strange responses that seem like they're from a computer.
Chatbots can help scammers reach more victims without needing many people. Just one chatbot
could trick as many people as a whole call Center could before. Though there's not a lot of
proof that this is happening a lot right now, the people we talked to in our research think this
problem will get worse. Chatbots will make scams more common, and it will be harder to tell
if it's a computer or a person talking [6].

C. Deep fakes video


Fake videos, known as deep fakes, are already tricking people. Some use them as "click bait"
to make people visit harmful websites that steal credit card details for fraud. There have been
cases where scammers use the image and identity of someone trustworthy to get people to
interact with harmful content. A bank using "selfie video ID" told us about basic attempts where
people showed a deep fake video to their webcam, trying to trick the system. Deep fake videos
will become more common. People we talked to are watching closely to see how technology
and changes in behavior can help individuals tell what content is trustworthy and what is not
[7].

D. Voice cloning-scams and voice ID


Deep fake technology can copy voices very accurately. Right now, making a really good voice
clone might need a couple of hours of audio, but this might not be necessary in the future. A
tech company we talked to thinks that soon, a voice clone that sounds just like a real person
could be made with only a few seconds of audio. Scammers are already using voice cloning in
scams. For instance, they might use a cloned voice to leave a voicemail, or even have a live
conversation with someone pretending to be someone else. This could be used for fraud easily.
Imagine someone getting a call from a person sounding like their boss, asking them to send
money to a different account [8].

III. FRAUD DETECTION


Fraud detection refers to the process of identifying and preventing fraudulent activities within
various systems, transactions, or processes. Detecting fraud is crucial in safeguarding
individuals, businesses, and organizations from financial losses, reputational damage, and legal
consequences [9].

273
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

• Assessment of Fraud Detection Methods: Traditionally, fraud detection relied on rule-based


systems with predefined rules to identify suspicious transactions. However, these systems often
faced challenges with high false positive rates and struggled to adapt to new and emerging
fraud patterns.

• Integration of Artificial Intelligence in Fraud Detection: The application of Artificial


Intelligence (AI) techniques, including Neural Networks and decision trees, has demonstrated
significant improvements in fraud detection accuracy. For example, Zheng et al. (2020)
introduced a deep learning-based fraud detection framework that outperformed traditional
methods.

• Role of Machine Learning in Fraud Detection: Machine learning algorithms have become
widely utilized in fraud detection due to their capability to identify intricate patterns and
anomalies in large datasets. In a study by Johnson et al. (2019), a fraud detection system was
developed using a random forest algorithm.

• Real-Time Fraud Detection: Swift identification of fraud in real-time is crucial for preventing
financial losses and mitigating the impact of fraudulent activities. Deep learning models, such
as recurrent Neural Networks, have been employed for real-time fraud detection owing to their
ability to process sequential data.

• Deep Learning Architectures for Fraud Detection: Advanced deep learning architectures, such
as Neural Networks and Convolutional Neural Networks, have shown promise in enhancing
fraud detection capabilities. These sophisticated models offer improved accuracy and
effectiveness in identifying fraudulent activities [10].

IV. OTHER TYPES OF FRAUDS


A. Credit card fraud
Credit card fraud is a widespread form of cybercrime where fraudsters use various methods to
obtain users' personal data. They may hack into this information through phone calls, Wi-Fi
hotspots, or emails. Importantly, these fraudsters can steal the cardholder's details without
physically having the card in their possession, making online means their primary tool for
carrying out such activities [11].

B. Mobile fraud
Mobile fraud refers to deceptive and illicit activities conducted through mobile devices,
typically involving the unauthorized access, manipulation, or exploitation of personal or
financial information. This type of fraud exploits vulnerabilities in mobile technologies and
takes advantage of users' trust in their smartphones or other mobile devices.

C. Internal fraud
Internal fraud refers to dishonest and deceptive activities carried out by individuals within an
organization. Unlike external threats, internal fraud involves employees, contractors, or other
individuals with direct access to the organization's systems, assets, or sensitive information.
Internal fraud can take various forms, and it often involves the misuse or theft of resources for
personal gain.

D. Money laundering
Money laundering is the process of making illegally obtained gains, often from criminal
activities, appear legitimate by passing them through a complex sequence of banking transfers

274
National Conference on "Recent Advancements in Science & Technology" ISBN : 978-81-19931-25-5

or commercial transactions. The primary goal of money laundering is to obscure the true origin
of the funds, making them appear to be derived from legal sources.

E. Identity and social fraud


Identity and social fraud involve deceptive practices where individuals or entities misrepresent
their identity or manipulate social relationships for personal gain or to engage in fraudulent
activities. These fraudulent activities can have various forms and implications [12][13].

V. CONCLUSION

In conclusion, the exploration of AI scams and frauds underscores the complex and evolving
challenges presented by the intersection of technology and deceptive practices. The rapid
advancement of artificial intelligence has not only ushered in innovative solutions but has also
provided fertile ground for malicious actors to orchestrate sophisticated scams. AI scams,
ranging from personalized fraudulent content to deepfake videos and voice cloning, highlight
the adaptability of scammers in exploiting cutting-edge technologies. These scams capitalize
on the vast pool of personal information available online, making them not only more
convincing but also harder to detect. As technology continues to progress, the risks associated
with AI scams demand heightened awareness, robust cybersecurity measures, and a proactive
approach to stay ahead of emerging threats.

REFERENCES
1. J. Liu et al., "Artificial Intelligence in the 21st Century," in IEEE Access, vol. 6, pp. 34403-34421, doi:
10.1109/ACCESS.2018.2819688, 2021.
2. J. Jha et al., "Artificial Intelligence and Applications," 1st International Conference on Intelligent Computing and
Research Trends (ICRT), Roorkee, India, pp. 1-4, doi: 10.1109/ICRT57042.2023.10146698, 2023.
3. M. F. Ansari, A. Panigrahi, G. Jakka, A. Pati and K. Bhattacharya, "Prevention of Phishing attacks using AI Algorithm,"
2nd Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology
(ODICON), Bhubaneswar, India, pp. 1-5, doi: 10.1109/ODICON54453.2022.10010185, 2022.
4. S. Yang, X. Bi, J. Xiao and J. Xia, "A Text-to-Image Generation Method Based on Multiattention Depth Residual
Generation Adversarial Network," 7th International Conference on Computer and Communications (ICCC), Chengdu,
China, pp. 1817-1821, doi: 10.1109/ICCC54389.2021.9674427, 2021.
5. M. Z. Hossain, F. Sohel, M. F. Shiratuddin, H. Laga and M. Bennamoun, "Text to Image Synthesis for Improved Image
Captioning," in IEEE Access, vol. 9, pp. 64918-64928, doi: 10.1109/ACCESS.2021.3075579, 2021.
6. M. Osugi and D. V. Vargas, "Image Generation from Text and Segmentation," Tenth International Symposium on
Computing and Networking Workshops (CANDARW), Himeji, Japan, pp. 206-211, doi:
10.1109/CANDARW57323.2022.00041, 2022.
7. I. Hasan, S. Rizvi, S. Jain and S. Huria, "The AI enabled Chatbot Framework for Intelligent Citizen-Government
Interaction for Delivery of Services," 8th International Conference on Computing for Sustainable Global Development
(INDIACom), New Delhi, India, pp. 601-606, 2021.
8. S. Guefrachi et al., "Deep learning based DeepFake video detection," International Conference on Smart Computing and
Application (ICSCA), Hail, Saudi Arabia, pp. 1-8, doi: 10.1109/ICSCA57840.2023.10087584, 2023.
9. B. Zhang and T. Sim, "Localizing Fake Segments in Speech," 26th International Conference on Pattern Recognition
(ICPR), Montreal, QC, Canada, pp. 3224-3230, doi: 10.1109/ICPR56361.2022.9956134, 2022.
10. Bao, Yang and Hilary, Gilles and Ke, Bin, “Artificial Intelligence and Fraud Detection Innovative Technology at the
interface of Finance and Operations”, Springer Series in Supply Chain Management, forthcoming, Springer Nature,
http://dx.doi.org/10.2139/ssrn.3738618, 2020.
11. G. J. Priya and S. Saradha, "Fraud Detection and Prevention Using Machine Learning Algorithms: A Review," 7th
International Conference on Electrical Energy Systems (ICEES), Chennai, India, pp. 564-568, doi:
10.1109/ICEES51510.2021.9383631, 2021.
12. S. K. Hashemi, S. L. Mirtaheri and S. Greco, "Fraud Detection in Banking Data by Machine Learning Techniques," in
IEEE Access, vol. 11, pp. 3034-3043, doi: 10.1109/ACCESS.2022.3232287, 2023.
13. N. Sugunaraj, A. R. Ramchandra and P. Ranganathan, "Cyber Fraud Economics, Scam Types, and Potential Measures to
Protect U.S. Seniors: A Short Review," IEEE International Conference on Electro Information Technology (eIT),
Mankato, MN, USA, pp. 623-627, doi: 10.1109/eIT53891.2022.9813960, 2022.

275

You might also like