{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:18:11Z","timestamp":1757589491683,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811982330"},{"type":"electronic","value":"9789811982347"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-8234-7_37","type":"book-chapter","created":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T07:05:58Z","timestamp":1669187158000},"page":"477-489","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["En-SeqGAN: An Efficient Sequence Generation Model for\u00a0Deceiving URL Classifiers"],"prefix":"10.1007","author":[{"given":"Tuan Dung","family":"Pham","sequence":"first","affiliation":[]},{"given":"Thi Thanh Thuy","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Viet Cuong","family":"Ta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,24]]},"reference":[{"key":"37_CR1","unstructured":"https:\/\/www.kaspersky.com\/about\/press-releases\/2019_malware-variety-grows-by-137-in-2019-due-to-web-skimmers. Accessed 20 January 2020"},{"key":"37_CR2","unstructured":"Le, H., Pham, Q., Sahoo, D., Hoi, S.C.H.: URLNet: learning a URL representation with deep learning for malicious URL detection. arXiv preprint arXiv:1802.03162 (2018)"},{"key":"37_CR3","unstructured":"Corley, I., Lwowski, J., Hoffman, J.: Domaingan: generating adversarial examples to attack domain generation algorithm classifiers. arXiv preprint arXiv:1911.06285 (2019)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, H.S., Woodbridge, J., Filar, B.: DeepDGA: adversarially-tuned domain generation and detection. In: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, pp. 13\u201321 (2016)","DOI":"10.1145\/2996758.2996767"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"AlEroud, A., Karabatis, G.: Bypassing detection of URL-based phishing attacks using generative adversarial deep neural networks. In: Proceedings of the Sixth International Workshop on Security and Privacy Analytics, pp. 53\u201360 (2020)","DOI":"10.1145\/3375708.3380315"},{"issue":"3","key":"37_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/3308897.3308959","volume":"46","author":"M Trevisan","year":"2019","unstructured":"Trevisan, M., Drago, I.: Robust URL classification with generative adversarial networks. ACM SIGMETRICS Perform. Eval. Rev. 46(3), 143\u2013146 (2019)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"37_CR7","unstructured":"Sabir, B., Babar, M.A., Gaire, R.: An evasion attack against ml-based phishing URL detectors. arXiv preprint arXiv:2005.08454 (2020)"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Anand, A., Gorde, K., Moniz, J.R.A., Park, N., Chakraborty, T., Chu, B.-T.: Phishing URL detection with oversampling based on text generative adversarial networks. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 1168\u20131177. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622547"},{"key":"37_CR9","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. Advances Neural Inf. Process. Syst. 27 (2014)"},{"key":"37_CR10","unstructured":"Goodfellow, I.: Generative adversarial networks for text. In: Conference on Neural Information Processing Systems (2016)"},{"key":"37_CR11","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of wasserstein GANs. arXiv preprint arXiv:1704.00028 (2017)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Weedon, M., Tsaptsinos, D., Denholm-Price, J.: Random forest explorations for URL classification. In: 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/CyberSA.2017.8073403"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Bahnsen, A.C., Bohorquez, E.C., Villegas, S., Vargas, J., Gonz\u00e1lez, F.A.: Classifying phishing URLs using recurrent neural networks. In: 2017 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u20138. IEEE (2017)","DOI":"10.1109\/ECRIME.2017.7945048"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Yu, L., Zhang, W., Wang, J., Yu, Y.: SeqGAN: sequence generative adversarial nets with policy gradient. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 31, no. 1 (2017)","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Xin, B., Yu, H., Qin, Y., Tang, Q., Zhu, Z.: Exploration entropy for reinforcement learning. Math. Probl. Eng. 2020 (2020)","DOI":"10.1155\/2020\/2672537"},{"issue":"3","key":"37_CR16","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00992696","volume":"8","author":"RJ Williams","year":"1992","unstructured":"Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3), 229\u2013256 (1992)","journal-title":"Mach. Learn."},{"issue":"1","key":"37_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCIAIG.2012.2186810","volume":"4","author":"CB Browne","year":"2012","unstructured":"Browne, C.B., et al.: A survey of Monte Carlo tree search methods. IEEE Trans. Comput. Intell. AI Games 4(1), 1\u201343 (2012)","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"37_CR18","unstructured":"Mohammad, R.M., Thabtah, F., McCluskey, L.: Phishing websites features. School of Computing and Engineering, University of Huddersfield (2015)"},{"key":"37_CR19","unstructured":"https:\/\/commoncrawl.org\/"},{"key":"37_CR20","unstructured":"https:\/\/phishtank.org\/"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Pham, T.D., Pham, T.T.T., Hoang, S.T., Ta, V.C.: Exploring efficiency of GAN-based generated URLs for phishing URL detection. In: 2021 International Conference on Multimedia Analysis and Pattern Recognition (MAPR), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/MAPR53640.2021.9585287"}],"container-title":["Communications in Computer and Information Science","Recent Challenges in Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8234-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T07:14:18Z","timestamp":1669187658000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8234-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811982330","9789811982347"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8234-7_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}