{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:42:44Z","timestamp":1760074964986,"version":"build-2065373602"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185619","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"559-564","source":"Crossref","is-referenced-by-count":0,"title":["QR Code Scanner with Anti-Qrishing Real-Time Technique"],"prefix":"10.1109","author":[{"given":"Ruslan","family":"Shevchuk","sequence":"first","affiliation":[{"name":"University of Bielsko-Biala,Department of Computer Science and Automatics,Bielsko-Biala,Poland"}]},{"given":"Patryk","family":"Ihas","sequence":"additional","affiliation":[{"name":"University of Bielsko-Biala,Department of Computer Science and Automatics,Bielsko-Biala,Poland"}]}],"member":"263","reference":[{"article-title":"Quick response code (qr code)","year":"2022","author":"Wave","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.798199"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.20211101.oa37"},{"issue":"1","key":"ref5","first-page":"1","article-title":"Building customer loyalty in digital transaction using qr code: Quick response code indonesian standard (qris)","volume":"20","author":"Chohan","year":"2022","journal-title":"Journal of Distribution Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.104049"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/su14084437"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.25236\/ijfet.2021.030302"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12020286"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10031-4_7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare9030298"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17781\/P002571"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554172"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554172"},{"issue":"11","key":"ref15","first-page":"54","article-title":"Looks can be deceiving when it comes to qr codes","volume":"116","author":"Kempen","year":"2023","journal-title":"Servamus Community-based Safety and Security Magazine"},{"key":"ref16","first-page":"296","article-title":"New generation mobile cyber security threats: Qr codes and social engineering threats","volume-title":"Cyber-Physical Systems and Supporting Technologies for Industrial Automation","author":"Ayd\u0131n","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68483-8_2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2025.3530487"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICECET61485.2024.10698628"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-65175-5_21"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CONECCT62155.2024.10677114"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3233\/faia240358"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3291811"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3411632"},{"issue":"2","key":"ref25","first-page":"197","article-title":"A evaluating security and privacy features of quick response code scanners: A comparative study","volume":"10","author":"Rafsanjani","year":"2022","journal-title":"Open International Journal of Informatics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASIANCON55314.2022.9908759"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE59459.2023.10468153"},{"key":"ref28","article-title":"Detecting Phishing URLs in QR codes using Heuristic Techniques","volume-title":"PhD thesis","author":"Khan","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2021.3.4186"},{"volume-title":"React and react native.","year":"2017","author":"Boduch","key":"ref30"},{"year":"2025","key":"ref31","article-title":"Expo documentation"},{"volume-title":"Learning TypeScript.","year":"2022","author":"Goldberg","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2002.1045042"},{"volume-title":"Virustotal documentation hub","year":"2025","key":"ref34"},{"volume-title":"Qr & barcode reader","year":"2021","key":"ref35"},{"volume-title":"Qr scanner\u2014free, safe qr code reader, zero ads","year":"2021","key":"ref36"},{"volume-title":"G data qr code scanner","year":"2021","key":"ref37"},{"volume-title":"Qr code reader and scanner: App for android","year":"2021","key":"ref38"},{"year":"2021","key":"ref39","article-title":"Qr droid"},{"year":"2020","key":"ref40","article-title":"Cheetah mobile qr code & bar code scanner"},{"year":"2021","key":"ref41","article-title":"Sophos intercept x for mobile"},{"article-title":"Barsec droid","year":"2018","author":"Wahsheh","key":"ref42"},{"volume-title":"Lionic secure qr code scanner","year":"2022","key":"ref43"},{"volume-title":"Phishtank","year":"2025","key":"ref44"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185619.pdf?arnumber=11185619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:12:08Z","timestamp":1760073128000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185619","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}