{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T08:08:39Z","timestamp":1772006919284,"version":"3.50.1"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2126641,CNS-2422035"],"award-info":[{"award-number":["CNS-2126641,CNS-2422035"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsac67867.2025.00064","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:54:58Z","timestamp":1771966498000},"page":"719-735","source":"Crossref","is-referenced-by-count":0,"title":["PP3D: An In-Browser Vision-Based Defense Against Web Behavior Manipulation Attacks"],"prefix":"10.1109","author":[{"given":"Spencer","family":"King","sequence":"first","affiliation":[{"name":"University of Georgia,Athens,GA,USA"}]},{"given":"Irfan","family":"Ozen","sequence":"additional","affiliation":[{"name":"University of Georgia,Athens,GA,USA"}]},{"given":"Karthika","family":"Subramani","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,Atlanta,GA,USA"}]},{"given":"Saranyan","family":"Senthivel","sequence":"additional","affiliation":[{"name":"DXC Technology,New Orleans,LA,USA"}]},{"given":"Phani","family":"Vadrevu","sequence":"additional","affiliation":[{"name":"Louisiana State University,Baton Rouge,LA,USA"}]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[{"name":"University of Georgia,Athens,GA,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Hacking the Human: Social Engineering Techniques and Security Countermeasures","author":"Mann","year":"2008"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.jisa.2014.09.005","article-title":"Advanced social engineering attacks","volume":"22","author":"Krombholz","year":"2015","journal-title":"Journal of Information Security and Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561467"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23163"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2018.00044"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icsc.2011.52"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417233"},{"key":"ref12","first-page":"3793","article-title":"Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages","volume-title":"USENIX Security Symposium","author":"Lin","year":"2021"},{"key":"ref13","first-page":"1633","article-title":"Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach","volume-title":"31st USENIX Security Symposium (USENIX Security22)","author":"Liu","year":"2022"},{"key":"ref14","first-page":"4139","article-title":"Knowledge expansion and counterfactual interaction for {Reference-Based} phishing detection","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Liu","year":"2023"},{"key":"ref15","first-page":"523","article-title":"Less defined knowledge and more true alarms: Reference-based phishing detection without a pre-defined reference list","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Liu","year":"2024"},{"key":"ref16","article-title":"Knowphish: Large language models meet multimodal knowledge graphs for enhancing reference-based phishing detection","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Li","year":"2024"},{"key":"ref17","volume-title":"FBI Releases Annual Internet Crime Report"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355600"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423631"},{"key":"ref20","volume-title":"Stand up to scareware with scareware blocker, now available in preview in Microsoft Edge","author":"Blog","year":"2025"},{"key":"ref21","volume-title":"Google safe browsing"},{"key":"ref22","article-title":"TRIDENT: Towards detecting and mitigating web-based social engineering attacks","volume-title":"USENIX Security Symposium. USENIX","author":"Yang","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3403197"},{"key":"ref24","article-title":"ONNX Runtime | Home","volume-title":"\/\/onnxruntime.ai\/"},{"key":"ref25","volume-title":"Tesseract.js | Pure Javascript OCR for 100 Languages!"},{"key":"ref26","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","volume":"abs\/1704.04861","author":"Howard","year":"2017","journal-title":"CoRR"},{"key":"ref27","article-title":"Well-Read Students Learn Better: On the Importance of Pre-training Compact Models","author":"Turc","year":"2019","journal-title":"arXiv"},{"key":"ref28","volume-title":"A research-oriented top sites ranking hardened against manipulation - Tranco - tranco-list.eu","year":"2023"},{"key":"ref29","volume-title":"commonsmachinery\/blockhash","year":"2025"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref31","volume-title":"Common Crawl - Open Repository of Web Crawl Data"},{"issue":"43","key":"ref32","volume-title":"Computing Krippendorff\u2019s Alpha-Reliability","author":"Krippendorff","year":"2011"},{"key":"ref33","first-page":"1","article-title":"Calculating inter-coder reliability in media content analysis using krippendorff\u2019s alpha","volume":"15","author":"De Swert","year":"2012","journal-title":"Center for Politics and Communication"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2917862"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref36","article-title":"Adversarial attacks and defences: A survey","author":"Chakraborty","year":"2018","journal-title":"arXiv preprint arXiv"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179473"},{"key":"ref39","volume-title":"A llm assisted exploitation of ai-guardian","author":"Carlini","year":"2023"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103170"},{"key":"ref41","article-title":"Fooling OCR Systems with Adversarial Text Images","author":"Song","year":"2018","journal-title":"arXiv"},{"key":"ref42","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint arXiv"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21105\/joss.02607"},{"key":"ref44","article-title":"Foolbox: A python toolbox to benchmark the robustness of machine learning models","volume-title":"Reliable Machine Learning in the Wild Workshop, 34th International Conference on Machine Learning","author":"Rauber","year":"2017"},{"key":"ref45","volume-title":"QData\/TextAttack","year":"2025"},{"key":"ref46","volume-title":"Overview - OpenAI API"},{"key":"ref47","volume-title":"First Click Times on Websites Versus Images - MeasuringU","author":"S."},{"key":"ref48","volume-title":"Usability Engineering","author":"Nielsen","year":"1994"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3555765"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.1145\/3406522.3446038","volume-title":"Impact of Response Latency on User Behaviour in Mobile Web Search","author":"Arapakis","year":"2021"},{"key":"ref51","volume-title":"How People Use Google Search (New User Behavior Study)","year":"2020"},{"key":"ref52","volume-title":"The Web unpacked: a quantitative analysis of global Web usage","author":"Xavier","year":"2024"},{"key":"ref53","first-page":"120230","article-title":"Webphish: Detecting phishing web pages by exploiting raw url and html content with deep learning","volume":"225","author":"Aljofey","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3162594"},{"key":"ref56","article-title":"Evaluating the effectiveness and robustness of visual similarity-based phishing detection models","volume-title":"Proceedings of the 34th USENIX Security Symposium (USENIX Security 2025)","author":"Ji","year":"2025"},{"key":"ref57","volume-title":"It doesn\u2019t look like anything to me: Using diffusion model to subvert visual phishing detectors"},{"key":"ref58","volume-title":"Phishtank: Phishing intelligence"},{"key":"ref59","volume-title":"Openphish: Phishing intelligence"},{"key":"ref60","volume-title":"Puppeteer - Puppeteer - pptr.dev","year":"2023"},{"key":"ref61","volume-title":"puppeteer-extra-plugin-stealth - npmjs.com","year":"2023"},{"key":"ref62","volume-title":"Desktop Screen Resolution Stats Worldwide, December 2020","year":"2023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23030"},{"key":"ref64","volume-title":"The best cpm ad networks for publishers"},{"issue":"8","key":"ref65","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"Levenshtein","year":"1966","journal-title":"Soviet physics doklady"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"ref67","article-title":"Minilm: Deep self-attention distillation for task-agnostic compression of pre-trained transformers","author":"Wang","year":"2020","journal-title":"NeurIPS"},{"key":"ref68","first-page":"74","article-title":"Rouge: A package for automatic evaluation of summaries","author":"Lin","year":"2004","journal-title":"Text summarization branches out"}],"event":{"name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE Annual Computer Security Applications Conference (ACSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11391636\/11391706\/11391739.pdf?arnumber=11391739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:16:06Z","timestamp":1772003766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391739\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/acsac67867.2025.00064","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}