Leveraging Bilateral Temporal Self-Attention (BilTSM) Networks for Real-Time Scam Call and Cyber Fraud Detection: Methods, Applications, and Performance Evaluation
DOI:
https://doi.org/10.32628/IJSRSET2512507Abstract
Scam phone calls and cyber fraud cause staggering financial losses worldwide, demanding advanced real-time detection solutions. This paper proposes a novel deep learning architecture, Bilateral Temporal Self-Attention (BilTSM) Network, which integrates bilateral (bi-directional) temporal context modeling with self-attention mechanisms and temporal shift operations for efficient sequential data analysis. We apply BilTSM to detect scam calls and fraudulent activities in cybersecurity (e.g. credit card transactions, network intrusions) and benchmark its performance against Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, Transformer-based models, and Random Forest classifiers. The BilTSM model is evaluated on publicly available datasets, including the Kaggle Credit Card Fraud dataset, CTU-13 botnet traffic, and UNSW-NB15 network intrusion data. Our results show that BilTSM achieves superior accuracy, precision, recall, F1-score, and ROC-AUC compared to baseline models, while operating with low latency suitable for real-time deployment. We present a comprehensive theoretical background on the BilTSM architecture, including mathematical formulations of its bilateral self-attention and temporal shift modules. Detailed experimental settings, hyperparameter tuning, and data preprocessing strategies are described. We also demonstrate BilTSM’s practicality in real-world telecom infrastructure and cybersecurity operations, discussing deployment considerations. The paper concludes with insights into BilTSM’s advantages, current limitations (such as class imbalance and novelty detection challenges), and future research directions, paving the way for more robust real-time fraud detection systems.
📊 Article Downloads
References
J. Lin, C. Gan, and S. Han, “TSM: Temporal Shift Module for Efficient Video Understanding,” Proc. IEEE/CVF International Conference on Computer Vision (ICCV), pp. 7083–7093, 2019. medium.com DOI: https://doi.org/10.1109/ICCV.2019.00718
I. Benchaji, S. Douzi, B. El Ouahidi, and J. Jaafari, “Enhanced credit card fraud detection based on attention mechanism and LSTM deep model,” Journal of Big Data, vol. 8, no. 151, pp. 1–25, 2021. journalofbigdata.springeropen.com DOI: https://doi.org/10.1186/s40537-021-00541-8
K. Sinha, A. Viswanathan, and J. Bunn, “Tracking Temporal Evolution of Network Activity for Botnet Detection,” arXiv:1908.03443 [cs.CR], 2019. ar5iv.labs.arxiv.org
C. Yu et al., “Credit Card Fraud Detection Using Advanced Transformer Model,” arXiv:2406.03733 [cs.LG], 2024. arxiv.org DOI: https://doi.org/10.1109/MetaCom62920.2024.00064
N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” Proc. Military Communications and Information Systems Conf. (MilCIS), 2015. research.unsw.edu.au DOI: https://doi.org/10.1109/MilCIS.2015.7348942
S. García, M. Grill, J. Stiborek, and A. Zunino, “An empirical comparison of botnet detection methods,” Computers & Security, vol. 45, pp. 100–123, 2014. impactcybertrust.org DOI: https://doi.org/10.1016/j.cose.2014.05.011
Truecaller & Harris Poll, “U.S. Spam & Scam Report 2024,” Truecaller Insights, 2024. publicinterestnetwork.org
Global Anti-Scam Alliance (GASA) and Feedzai, “Global State of Scams Report 2024,” 2024. businesswire.com
D. D. Pozzolo et al., “Calibrating Probability with Undersampling for Unbalanced Classification,” Proc. IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 159–166, 2015. github.com DOI: https://doi.org/10.1109/SSCI.2015.33
A. Ali et al., “Efficacy of CNN-BiLSTM Hybrid Model for Network Anomaly Detection on Imbalanced Data,” Proc. IEEE Int. Conf. on Communications (ICC), 2023. par.nsf.gov
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.