{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T07:22:18Z","timestamp":1774596138530,"version":"3.50.1"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Fusion"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.inffus.2026.104209","type":"journal-article","created":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:47:11Z","timestamp":1770742031000},"page":"104209","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["URL2Graph++: Unified semantic-structural-character learning for malicious URL detection"],"prefix":"10.1016","volume":"132","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0608-8544","authenticated-orcid":false,"given":"Ye","family":"Tian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2125-0109","authenticated-orcid":false,"given":"Yifan","family":"Jia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8216-2925","authenticated-orcid":false,"given":"Jianguo","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1682-5712","authenticated-orcid":false,"given":"Yanbin","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-2177","authenticated-orcid":false,"given":"Zhiquan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7726-2083","authenticated-orcid":false,"given":"Xiaowen","family":"Ling","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.inffus.2026.104209_bib0001","first-page":"1","article-title":"Reliability and robustness analysis of machine learning based phishing url detectors","author":"Sabir","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.inffus.2026.104209_bib0002","series-title":"2023 IEEE Symposium on Security and Privacy (Sp)","first-page":"2566","article-title":"Beyond phish: toward detecting fraudulent e-commerce websites at scale","author":"Bitaab","year":"2023"},{"key":"10.1016\/j.inffus.2026.104209_bib0003","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"27869","article-title":"Phishagent: a robust multimodal agent for phishing webpage detection","volume":"39","author":"Cao","year":"2025"},{"key":"10.1016\/j.inffus.2026.104209_bib0004","series-title":"31st USENIX Security Symposium (USENIX Security 22)","first-page":"1633","article-title":"Inferring phishing intention via webpage appearance and dynamics: a deep vision based approach","author":"Liu","year":"2022"},{"key":"10.1016\/j.inffus.2026.104209_bib0005","series-title":"Companion Proceedings of the ACM on Web Conference 2025","first-page":"2863","article-title":"PhishIntel: toward practical deployment of reference-based phishing detection","author":"Li","year":"2025"},{"key":"10.1016\/j.inffus.2026.104209_bib0006","series-title":"33rd USENIX Security Symposium (USENIX Security 24)","first-page":"793","article-title":"{KnowPhish}: large language models meet multimodal knowledge graphs for enhancing {reference-based} phishing detection","author":"Li","year":"2024"},{"key":"10.1016\/j.inffus.2026.104209_bib0007","series-title":"33rd USENIX Security Symposium (USENIX Security 24)","first-page":"523","article-title":"Less defined knowledge and more true alarms: reference-based phishing detection without a pre-defined reference list","author":"Liu","year":"2024"},{"key":"10.1016\/j.inffus.2026.104209_bib0008","series-title":"Technical Report","year":"2025"},{"key":"10.1016\/j.inffus.2026.104209_bib0009","unstructured":"D. Sahoo, C. Liu, S.C.H. Hoi, Malicious URL detection using machine learning: a survey, arXiv: 1701.07179(2017)."},{"issue":"2","key":"10.1016\/j.inffus.2026.104209_bib0010","first-page":"717","article-title":"Robust detection of malicious URLs with self-paced wide & deep learning","volume":"19","author":"Liang","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.inffus.2026.104209_bib0011","series-title":"30th USENIX Security Symposium (USENIX Security 21)","first-page":"3793","article-title":"Phishpedia: a hybrid deep learning based approach to visually identify phishing webpages","author":"Lin","year":"2021"},{"issue":"1","key":"10.1016\/j.inffus.2026.104209_bib0012","doi-asserted-by":"crossref","first-page":"8842","DOI":"10.1038\/s41598-022-10841-5","article-title":"An effective detection approach for phishing websites using URL and HTML features","volume":"12","author":"Aljofey","year":"2022","journal-title":"Sci. Rep."},{"key":"10.1016\/j.inffus.2026.104209_bib0013","series-title":"2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom)","first-page":"265","article-title":"URL2Vec: URL modeling with character embeddings for fast and accurate phishing website detection","author":"Yuan","year":"2018"},{"key":"10.1016\/j.inffus.2026.104209_bib0014","unstructured":"D. Lain, Y. Nakatsuka, K. Kostiainen, G. Tsudik, S. Capkun, URL Inspection Tasks: Helping Users Detect Phishing Links in Emails, arXiv: 2502.20234(2025)."},{"issue":"10","key":"10.1016\/j.inffus.2026.104209_bib0015","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.1109\/TNN.2011.2161999","article-title":"Textual and visual content-based anti-phishing: a Bayesian approach","volume":"22","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Neural Netw."},{"issue":"3","key":"10.1016\/j.inffus.2026.104209_bib0016","first-page":"1","article-title":"Learning to detect malicious urls","volume":"2","author":"Ma","year":"2011","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"10.1016\/j.inffus.2026.104209_bib0017","series-title":"Network and System Security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28\u201330, 2016, Proceedings 10","first-page":"467","article-title":"Detecting malicious urls using lexical analysis","author":"Mamun","year":"2016"},{"issue":"1","key":"10.1016\/j.inffus.2026.104209_bib0018","article-title":"Phishing detection: analysis of visual similarity based approaches","volume":"2017","author":"Jain","year":"2017","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"10.1016\/j.inffus.2026.104209_bib0019","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/s00521-016-2531-1","article-title":"Fast-flux hunter: a system for filtering online fast-flux botnet","volume":"29","author":"Almomani","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.inffus.2026.104209_bib0020","series-title":"2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)","first-page":"1","article-title":"Malicious url detection using logistic regression","author":"Chiramdasu","year":"2021"},{"key":"10.1016\/j.inffus.2026.104209_bib0021","series-title":"Proceedings of the 16th International Conference on Availability, Reliability and Security","first-page":"1","article-title":"A machine learning driven threat intelligence system for malicious URL detection","author":"Rupa","year":"2021"},{"issue":"1","key":"10.1016\/j.inffus.2026.104209_bib0022","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1186\/s13677-022-00349-8","article-title":"A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization","volume":"11","author":"Ullah","year":"2022","journal-title":"J. Cloud Comput."},{"key":"10.1016\/j.inffus.2026.104209_bib0023","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","article-title":"A stacking model using URL and HTML features for phishing webpage detection","volume":"94","author":"Li","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.inffus.2026.104209_bib0024","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"21628","article-title":"Toward more generalized malicious url detection models","volume":"38","author":"Tsai","year":"2024"},{"key":"10.1016\/j.inffus.2026.104209_bib0025","doi-asserted-by":"crossref","first-page":"8052","DOI":"10.1109\/ACCESS.2024.3352629","article-title":"Dephides: deep learning based phishing detection system","volume":"12","author":"Sahingoz","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.inffus.2026.104209_bib0026","unstructured":"H. Le, Q. Pham, D. Sahoo, S.C.H. Hoi, URLNet: learning a URL representation with deep learning for malicious URL detection, arXiv: 1802.03162(2018)."},{"key":"10.1016\/j.inffus.2026.104209_bib0027","series-title":"ICASSP 2020\u20132020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"2857","article-title":"Texception: a character\/word-level deep learning model for phishing URL detection","author":"Tajaddodianfar","year":"2020"},{"key":"10.1016\/j.inffus.2026.104209_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109955","article-title":"TCURL: exploring hybrid transformer and convolutional neural network on phishing URL detection","volume":"258","author":"Wang","year":"2022","journal-title":"Knowledge-Based Syst."},{"key":"10.1016\/j.inffus.2026.104209_bib0029","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.ins.2023.02.039","article-title":"CNN-fusion: an effective and lightweight phishing detection method based on multi-variant ConvNet","volume":"631","author":"Hussain","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.inffus.2026.104209_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102584","article-title":"HDP-CNN: highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection","volume":"114","author":"Zheng","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.inffus.2026.104209_bib0031","series-title":"DURLD: malicious URL detection using deep learning-based character level representations","first-page":"535","author":"Srinivasan","year":"2021"},{"issue":"10","key":"10.1016\/j.inffus.2026.104209_bib0032","doi-asserted-by":"crossref","first-page":"6673","DOI":"10.1109\/TII.2020.2977886","article-title":"Learning URL embedding for malicious website detection","volume":"16","author":"Yan","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.inffus.2026.104209_bib0033","series-title":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","first-page":"22","article-title":"Phishing URL detection via capsule-based neural network","author":"Huang","year":"2019"},{"key":"10.1016\/j.inffus.2026.104209_bib0034","doi-asserted-by":"crossref","first-page":"3016","DOI":"10.1007\/s10489-019-01433-4","article-title":"Bidirectional LSTM malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network","volume":"49","author":"Wang","year":"2019","journal-title":"Appl. Intell."},{"key":"10.1016\/j.inffus.2026.104209_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102964","article-title":"GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings","volume":"124","author":"Bozkir","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.inffus.2026.104209_bib0036","series-title":"2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","first-page":"340","article-title":"Research on malicious URL detection technology based on BERT model","author":"Chang","year":"2021"},{"key":"10.1016\/j.inffus.2026.104209_bib0037","unstructured":"P. Xu, A transformer-based model to detect phishing URLs, arXiv: 2109.02138(2021)."},{"key":"10.1016\/j.inffus.2026.104209_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111513","article-title":"Continuous multi-task pre-training for malicious URL detection and webpage classification","volume":"270","author":"Li","year":"2025","journal-title":"Comput. Netw."},{"key":"10.1016\/j.inffus.2026.104209_bib0039","series-title":"MILCOM 2021\u20132021 IEEE Military Communications Conference (MILCOM)","first-page":"197","article-title":"URLTran: improving phishing URL detection using transformers","author":"Maneriker","year":"2021"},{"issue":"13","key":"10.1016\/j.inffus.2026.104209_bib0040","doi-asserted-by":"crossref","first-page":"7429","DOI":"10.3390\/app13137429","article-title":"A lightweight multi-view learning approach for phishing attack detection using transformer with mixture of experts","volume":"13","author":"Wang","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.inffus.2026.104209_bib0041","series-title":"ICASSP 2023\u20132023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"1","article-title":"A large-scale pretrained deep model for phishing URL detection","author":"Wang","year":"2023"},{"key":"10.1016\/j.inffus.2026.104209_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.dib.2020.106304","article-title":"Malicious and benign webpages dataset","volume":"32","author":"Singh","year":"2020","journal-title":"Data Brief"},{"key":"10.1016\/j.inffus.2026.104209_bib0043","unstructured":"S.A. Kamran, S. Sengupta, A. Tavakkoli, Semi-supervised conditional GAN for simultaneous generation and detection of phishing URLs: a game theoretic perspective, arXiv: 2108.01852(2021)."},{"key":"10.1016\/j.inffus.2026.104209_bib0044","unstructured":"H. Touvron, L. Martin, K. Stone, P. Albert, A. Almahairi, Y. Babaei, N. Bashlykov, S. Batra, P. Bhargava, S. Bhosale, et al., Llama 2: open foundation and fine-tuned chat models, arXiv: 2307.09288(2023)."},{"key":"10.1016\/j.inffus.2026.104209_bib0045","unstructured":"A. Grattafiori, A. Dubey, A. Jauhri, A. Pandey, A. Kadian, A. Al-Dahle, A. Letman, A. Mathur, A. Schelten, A. Vaughan, et al., The llama 3 herd of models, arXiv: 2407.21783(2024)."},{"key":"10.1016\/j.inffus.2026.104209_bib0046","doi-asserted-by":"crossref","unstructured":"A. Conneau, K. Khandelwal, N. Goyal, V. Chaudhary, G. Wenzek, F. Guzm\u00e1n, E. Grave, M. Ott, L. Zettlemoyer, V. Stoyanov, Unsupervised cross-lingual representation learning at scale, arXiv: 1911.02116(2019).","DOI":"10.18653\/v1\/2020.acl-main.747"},{"key":"10.1016\/j.inffus.2026.104209_bib0047","series-title":"Proceedings of the 22nd International Conference on World Wide Web","first-page":"861","article-title":"Two years of short urls internet measurement: security threats and countermeasures","author":"Maggi","year":"2013"},{"issue":"1","key":"10.1016\/j.inffus.2026.104209_bib0048","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-74725-6","article-title":"Phishing URL detection with neural networks: an empirical study","volume":"14","author":"Ghalechyan","year":"2024","journal-title":"Sci. Rep."}],"container-title":["Information Fusion"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253526000886?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253526000886?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:00:46Z","timestamp":1774591246000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1566253526000886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":48,"alternative-id":["S1566253526000886"],"URL":"https:\/\/doi.org\/10.1016\/j.inffus.2026.104209","relation":{},"ISSN":["1566-2535"],"issn-type":[{"value":"1566-2535","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"URL2Graph++: Unified semantic-structural-character learning for malicious URL detection","name":"articletitle","label":"Article Title"},{"value":"Information Fusion","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.inffus.2026.104209","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"104209"}}