{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:52:06Z","timestamp":1778169126549,"version":"3.51.4"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51939001"],"award-info":[{"award-number":["51939001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976033"],"award-info":[{"award-number":["61976033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3237798","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T18:40:50Z","timestamp":1674067250000},"page":"6421-6443","source":"Crossref","is-referenced-by-count":92,"title":["A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7405-7646","authenticated-orcid":false,"given":"Sultan","family":"Asiri","sequence":"first","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8549-6794","authenticated-orcid":false,"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8380-2487","authenticated-orcid":false,"given":"Saleh","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6754-8976","authenticated-orcid":false,"given":"Shuhui","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of Alabama, Tuscaloosa, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0474-953X","authenticated-orcid":false,"given":"Tieshan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.331"},{"key":"ref2","volume-title":"Phishing Activity Trends Report","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.05.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00069"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2011.6016954"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945048"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2018.094367"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913705"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043188"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2020.109720"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/2041-210X.13256"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6622862"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2020.110460"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043396"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2753802"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920655"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.077"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HORA49412.2020.9152934"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/icaccs48705.2020.9074400"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/make3030034"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2020.0078"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151903"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9375997"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183083"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2947659"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895751"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-020-01392-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091514"},{"key":"ref32","volume-title":"Google Site","year":"2020"},{"key":"ref33","volume-title":"Phishtank Dataset","year":"2020"},{"key":"ref34","volume-title":"Alexa Dataset","year":"2020"},{"key":"ref35","volume-title":"JoeWein Dataset","year":"2020"},{"key":"ref36","volume-title":"Common Crawl Dataset","year":"2020"},{"key":"ref37","volume-title":"OpenPhish Dataset","year":"2020"},{"key":"ref38","volume-title":"Phishing Army: The blocklist to Filter Phishing!","author":"Draghetti","year":"2020"},{"key":"ref39","volume-title":"Alexa Top 1 Million Sites","author":"Ghodke","year":"2018"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1016\/j.dib.2020.106438","article-title":"Datasets for phishing websites detection","volume":"33","author":"Vrban\u010di\u010d","year":"2020","journal-title":"Data Brief"},{"key":"ref42","volume-title":"Parsed DMOZ Data","author":"Sood","year":"2021"},{"key":"ref43","volume-title":"Webscope | Yahoo Labs","year":"2021"},{"key":"ref44","volume-title":"Yandex.xml"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2020.111233"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463319000481"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926843"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.118488"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053670"},{"key":"ref51","article-title":"URLNet: Learning a URL representation with deep learning for malicious URL detection","author":"Le","year":"2018","journal-title":"arXiv:1802.03162"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049625"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991403"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00024"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121492"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14596-5"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.113842"},{"key":"ref58","article-title":"FastText.Zip: Compressing text classification models","author":"Joulin","year":"2016","journal-title":"arXiv:1612.03651"},{"key":"ref59","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1310.4546"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2003.1238663"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/jmse9030273"},{"key":"ref63","first-page":"355","volume-title":"Hands-On Machine Learning With Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems","author":"G\u00e9ron","year":"2017"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.79.8.2554"},{"key":"ref65","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung","year":"2014","journal-title":"arXiv:1412.3555"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2019.2959251"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249013"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297350"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/app9061152"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389824"},{"key":"ref72","first-page":"848","article-title":"Optimizing classifier performance via an approximation to the Wilcoxon-Mann-Whitney statistic","volume-title":"Proc. 20th Int. Conf. Mach. Learn. (ICML)","author":"Yan"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095713"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852416"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2021.115440"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10019269.pdf?arnumber=10019269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:57:16Z","timestamp":1707803836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10019269\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":73,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3237798","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}