{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:21:00Z","timestamp":1760142060144,"version":"build-2065373602"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185806","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"491-496","source":"Crossref","is-referenced-by-count":0,"title":["Email Augmentation: A Comparison of Fine-tuned Small Language Models"],"prefix":"10.1109","author":[{"given":"Francisco","family":"Cardoso","sequence":"first","affiliation":[{"name":"GECAD, ISEP Polytechnic of Porto,Porto,Portugal"}]},{"given":"Eva","family":"Maia","sequence":"additional","affiliation":[{"name":"GECAD, ISEP Polytechnic of Porto,Porto,Portugal"}]},{"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[{"name":"GECAD, ISEP Polytechnic of Porto,Porto,Portugal"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.3390\/app15063396"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.3390\/s24072077"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/BigData62323.2024.10825018"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.eswa.2025.127044"},{"year":"2019","author":"Das","article-title":"Automated email generation for targeted attacks using natural language","key":"ref5"},{"year":"2020","author":"Das","article-title":"Modeling coherency in generated emails by leveraging deep neural learners","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.18653\/v1\/2021.findings-acl.185"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1631\/FITEE.2300410"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3554727"},{"year":"2025","author":"Subramanian","article-title":"Small language models (slms) can still pack a punch: A survey","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3649449"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.18653\/v1\/n19\u20131423"},{"year":"2018","author":"Radford","article-title":"Improving language understanding by generative pre-training","key":"ref13"},{"key":"ref14","first-page":"5583","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume-title":"Proceedings of the 37th International Conference on Machine Learning (ICML)","author":"Raffel"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.18653\/v1\/2020.acl-main.703"},{"year":"2024","author":"Sun","article-title":"Fine-tuning vs prompting, can language models understand human values?","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.infsof.2024.107523"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/app14146254"},{"key":"ref19","article-title":"Language models are unsupervised multitask learners","author":"Radford","year":"2019","journal-title":"OpenAI, Tech. Rep"},{"year":"2025","author":"Team","article-title":"Gemma 3 technical report","key":"ref20"},{"year":"2021","author":"Hu","article-title":"Lora: Low-rank adaptation of large language models","key":"ref21"},{"key":"ref22","first-page":"74","article-title":"ROUGE: A package for automatic evaluation of summaries","author":"Lin","year":"2004","journal-title":"Text Summarization Branches Out"},{"volume-title":"International Conference on Learning Representations (ICLR)","author":"Zhang","article-title":"Bertscore: Evaluating text generation with bert","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.24963\/ijcai.2018\/618"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.18653\/v1\/n16-1014"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185806.pdf?arnumber=11185806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:24:37Z","timestamp":1760073877000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185806","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}