{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:46:05Z","timestamp":1776876365077,"version":"3.51.2"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2027,4,15]],"date-time":"2027-04-15T00:00:00Z","timestamp":1807747200000},"content-version":"am","delay-in-days":288,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["RS-2022-II220113"],"award-info":[{"award-number":["RS-2022-II220113"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115234","type":"journal-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T08:01:05Z","timestamp":1776067265000},"page":"115234","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["LLM-structured expert feedback for knowledge calibration of deep learning model to detect phishing URL"],"prefix":"10.1016","volume":"197","author":[{"given":"Seok-Hun","family":"Choi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3940-3611","authenticated-orcid":false,"given":"Seok-Jun","family":"Buu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7027-2429","authenticated-orcid":false,"given":"Sung-Bae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115234_bib1","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1109\/TIFS.2022.3164212","article-title":"Phishsim: Aiding phishing website detection with a feature-free tool","volume":"17","author":"Purwanto","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115234_bib2","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.1109\/TIFS.2022.3189530","article-title":"Advert: an adaptive and data-driven attention enhancement mechanism for phishing prevention","volume":"17","author":"Huang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115234_bib3","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.ins.2022.04.059","article-title":"A lightweight data representation for phishing urls detection in iot environments","volume":"603","author":"Bustio-Mart\u00ednez","year":"2022","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.asoc.2026.115234_bib4","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1109\/TSC.2023.3234806","article-title":"Adversarial autoencoder data synthesis for enhancing machine learning-based phishing detection algorithms","volume":"16","author":"Shirazi","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"10.1016\/j.asoc.2026.115234_bib5","doi-asserted-by":"crossref","first-page":"8842","DOI":"10.1038\/s41598-022-10841-5","article-title":"An effective detection approach for phishing websites using url and html features","volume":"12","author":"Aljofey","year":"2022","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115234_bib6","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","article-title":"Machine learning based phishing detection from urls","volume":"117","author":"Sahingoz","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115234_bib7","doi-asserted-by":"crossref","first-page":"36429","DOI":"10.1109\/ACCESS.2022.3151903","article-title":"Deep learning for phishing detection: taxonomy, current challenges and future directions","volume":"10","author":"Do","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.115234_bib8","first-page":"1168","article-title":"Phishing url detection with oversampling based on text generative adversarial networks","author":"Anand","year":"2018","journal-title":"IEEE Int. Conf. Big Data"},{"issue":"1","key":"10.1016\/j.asoc.2026.115234_bib9","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/TETC.2022.3170544","article-title":"Plausmal-gan: Plausible malware training based on generative adversarial networks for analogous zero-day malware detection","volume":"11","author":"Won","year":"2022","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.asoc.2026.115234_bib10","doi-asserted-by":"crossref","DOI":"10.1016\/j.advengsoft.2022.103288","article-title":"Phishing url detection using machine learning methods","volume":"173","author":"Ahammad","year":"2022","journal-title":"Adv. Eng. Softw."},{"issue":"2","key":"10.1016\/j.asoc.2026.115234_bib11","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/s42979-022-01069-1","article-title":"How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society","volume":"3","author":"Carroll","year":"2022","journal-title":"SN Comput. Sci."},{"issue":"1","key":"10.1016\/j.asoc.2026.115234_bib12","doi-asserted-by":"crossref","first-page":"25134","DOI":"10.1038\/s41598-024-74725-6","article-title":"Phishing url detection with neural networks: an empirical study","volume":"14","author":"Ghalechyan","year":"2024","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115234_bib13","first-page":"11809","article-title":"Rethinking calibration of deep neural networks: do not be afraid of overconfidence","volume":"34","author":"Wang","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.115234_bib14","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.116239","article-title":"Piracema. Io: a rules-based tree model for phishing prediction","volume":"191","author":"Da Silva","year":"2022","journal-title":"Expert Syst. Appl."},{"issue":"1-2","key":"10.1016\/j.asoc.2026.115234_bib15","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.eswa.2007.06.015","article-title":"Conflicting treatment model for certainty rule-based knowledge","volume":"35","author":"Huang","year":"2008","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115234_bib16","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-642-21004-4_7","article-title":"Rule-based expert systems","author":"Grosan","year":"2011","journal-title":"Intell. Syst. A Mod. Approach"},{"issue":"2024","key":"10.1016\/j.asoc.2026.115234_bib17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.70470\/SHIFRA\/2024\/001","article-title":"From text to threat detection: the power of nlp in cybersecurity","author":"Mohammed","year":"2024","journal-title":"SHIFRA"},{"key":"10.1016\/j.asoc.2026.115234_bib18","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2025.3545771","article-title":"Bert-phishfinder: a robust model for accurate phishing url detection with optimized distilbert","author":"Aljofey","year":"2025","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"8","key":"10.1016\/j.asoc.2026.115234_bib19","doi-asserted-by":"crossref","first-page":"331","DOI":"10.3390\/fi17080331","article-title":"Convolutional graph network-based feature extraction to detect phishing attacks","volume":"17","author":"Shakir","year":"2025","journal-title":"Future Internet"},{"issue":"2025","key":"10.1016\/j.asoc.2026.115234_bib20","first-page":"234","article-title":"Synthesizing deception: countering large language model-generated phishing campaigns through adaptive semantic anomaly detection","author":"Fetaji","year":"2025","journal-title":"Mesop. J. Comput. Sci."},{"issue":"2024","key":"10.1016\/j.asoc.2026.115234_bib21","doi-asserted-by":"crossref","first-page":"63","DOI":"10.58496\/BJML\/2024\/006","article-title":"Artificial intelligence predictions in cyber security: analysis and early detection of cyber attacks","author":"Khalaf","year":"2024","journal-title":"Babylon. J. Mach. Learn."},{"issue":"9","key":"10.1016\/j.asoc.2026.115234_bib22","doi-asserted-by":"crossref","first-page":"4403","DOI":"10.3390\/s23094403","article-title":"A deep learning-based innovative technique for phishing detection in modern security with uniform resource locators","volume":"23","author":"Aldakheel","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.asoc.2026.115234_bib23","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.future.2024.06.031","article-title":"An integrated model based on deep learning classifiers and pre-trained transformer for phishing url detection","volume":"161","author":"Do","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.115234_bib24","article-title":"Mutual information based logistic regression for phishing url detection","volume":"2","author":"Vajrobol","year":"2024","journal-title":"Cyber Secur. Appl."},{"key":"10.1016\/j.asoc.2026.115234_bib25","first-page":"2279","article-title":"Phishguard: machine learning-powered phishing url detection","author":"Murad","year":"2023","journal-title":"Congr. Comput. Sci. Comput. Eng. Appl. Comput."},{"issue":"11","key":"10.1016\/j.asoc.2026.115234_bib26","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1007\/s00521-020-05354-z","article-title":"A heuristic technique to detect phishing websites using twsvm classifier","volume":"33","author":"Rao","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.asoc.2026.115234_bib27","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104188","article-title":"Fdn-sa: fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering","volume":"148","author":"Vidyasri","year":"2025","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.asoc.2026.115234_bib28","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.eij.2021.12.003","article-title":"Detecting covid-19 chaos driven phishing\/malicious url attacks by a fuzzy logic and data mining based intelligence system","volume":"23","author":"Zahra","year":"2022","journal-title":"Egypt. Inform. J."},{"key":"10.1016\/j.asoc.2026.115234_bib29","first-page":"1","article-title":"Web-based phishing url detection model using deep learning optimization techniques","author":"Barik","year":"2025","journal-title":"Int. J. Data Sci. Anal."},{"issue":"3","key":"10.1016\/j.asoc.2026.115234_bib30","article-title":"A hybrid cnn-brown-bear optimization framework for enhanced detection of url phishing attacks","volume":"81","author":"Gupta","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"10.1016\/j.asoc.2026.115234_bib31","article-title":"Metaheuristics with deep learning driven phishing detection for sustainable and secure environment","volume":"56","author":"Alohali","year":"2023","journal-title":"Sustain. Energy Technol. Assess."},{"issue":"2024","key":"10.1016\/j.asoc.2026.115234_bib32","doi-asserted-by":"crossref","first-page":"57","DOI":"10.58496\/BJN\/2024\/007","article-title":"Integration between network intrusion detection and machine learning techniques to optimizing network security","author":"Elzaridi","year":"2024","journal-title":"Babylon. J. Netw."},{"issue":"2025","key":"10.1016\/j.asoc.2026.115234_bib33","doi-asserted-by":"crossref","first-page":"81","DOI":"10.70470\/SHIFRA\/2025\/005","article-title":"Beyond detection: Large language models and next-generation cybersecurity","author":"Ali","year":"2025","journal-title":"SHIFRA"},{"key":"10.1016\/j.asoc.2026.115234_bib34","article-title":"Character-level convolutional networks for text classification","volume":"28","author":"Zhang","year":"2015","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.115234_bib35","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"35","author":"Wei","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.115234_bib36","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.115234_bib37","unstructured":"L. Beurer-Kellner, M. Fischer, and M. Vechev, \u201cGuiding llms the right way: Fast, non-invasive constrained generation,\u201d arXiv preprint arXiv:2403.06988, 2024."},{"key":"10.1016\/j.asoc.2026.115234_bib38","first-page":"287","article-title":"Do as i can, not as i say: grounding language in robotic affordances","author":"Brohan","year":"2023","journal-title":"Conf. Robot Learn."},{"key":"10.1016\/j.asoc.2026.115234_bib39","unstructured":"T. Khot, H. Trivedi, M. Finlayson, Y. Fu, K. Richardson, P. Clark, and A. Sabharwal, \u201cDecomposed prompting: A modular approach for solving complex tasks,\u201d arXiv preprint arXiv:2210.02406, 2022."},{"issue":"2024","key":"10.1016\/j.asoc.2026.115234_bib40","doi-asserted-by":"crossref","first-page":"26","DOI":"10.70470\/EDRAAK\/2024\/004","article-title":"Fortifying ai against cyber threats advancing resilient systems to combat adversarial attacks","author":"Hussain","year":"2024","journal-title":"EDRAAK"},{"issue":"2","key":"10.1016\/j.asoc.2026.115234_bib41","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s10922-025-10010-9","article-title":"Domurls_bert: Pre-trained bert-based model for malicious domains and urls detection and classification","volume":"34","author":"El Mahdaouy","year":"2026","journal-title":"J. Netw. Syst. Manag."},{"key":"10.1016\/j.asoc.2026.115234_bib42","first-page":"278","article-title":"Phishurldetect: a parameter efficient fine-tuning of llms using lora for detection of phishing urls","author":"Ali","year":"2025","journal-title":"Int. Conf. Distrib. Comput. Netw."},{"key":"10.1016\/j.asoc.2026.115234_bib43","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111513","article-title":"Continuous multi-task pre-training for malicious url detection and webpage classification","volume":"270","author":"Li","year":"2025","journal-title":"Comput. Netw."},{"issue":"2023","key":"10.1016\/j.asoc.2026.115234_bib44","doi-asserted-by":"crossref","first-page":"134","DOI":"10.58496\/MJCS\/2023\/017","article-title":"Machine learning-based detection of smartphone malware: challenges and solutions","author":"Alamleh","year":"2023","journal-title":"Mesop. J. Cybersecur."},{"key":"10.1016\/j.asoc.2026.115234_bib45","unstructured":"Q. Zhong, L. Ding, J. Liu, B. Du, and D. Tao, \u201cCan chatgpt understand too? A comparative study on chatgpt and fine-tuned bert,\u201d arXiv preprint arXiv:2302.10198, 2023."},{"key":"10.1016\/j.asoc.2026.115234_bib46","first-page":"27869","article-title":"Phishagent: a robust multimodal agent for phishing webpage detection","author":"Cao","year":"2025","journal-title":"AAAI Conf. Artif. Intell."},{"issue":"1","key":"10.1016\/j.asoc.2026.115234_bib47","doi-asserted-by":"crossref","first-page":"11488","DOI":"10.1038\/s41598-023-37552-9","article-title":"Life-long phishing attack detection using continual learning","volume":"13","author":"Ejaz","year":"2023","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115234_bib48","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119598","article-title":"Triplet-trained graph transformer with control flow graph for few-shot malware classification","volume":"649","author":"Bu","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115234_bib49","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.ins.2019.09.055","article-title":"A convolutional neural-based learning classifier system for detecting database intrusion via insider attack","volume":"512","author":"Bu","year":"2020","journal-title":"Inf. Sci."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006824?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006824?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:01:59Z","timestamp":1776873719000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":49,"alternative-id":["S1568494626006824"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115234","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"LLM-structured expert feedback for knowledge calibration of deep learning model to detect phishing URL","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115234","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115234"}}