{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:19:28Z","timestamp":1775254768442,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825018","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"2558-2567","source":"Crossref","is-referenced-by-count":22,"title":["Next-Generation Phishing: How LLM Agents Empower Cyber Attackers"],"prefix":"10.1109","author":[{"given":"Khalifa","family":"Afane","sequence":"first","affiliation":[{"name":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA"}]},{"given":"Wenqi","family":"Wei","sequence":"additional","affiliation":[{"name":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA"}]},{"given":"Ying","family":"Mao","sequence":"additional","affiliation":[{"name":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA"}]},{"given":"Junaid","family":"Farooq","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn,Department of Electrical and Computer Engineering,Dearborn,MI,USA"}]},{"given":"Juntao","family":"Chen","sequence":"additional","affiliation":[{"name":"Fordham University,Department of Computer and Information Sciences,New York,NY,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0209684"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.01756"},{"key":"ref4","article-title":"Mitigating phishing threats","volume-title":"PhD Thesis","author":"Wang","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679494"},{"key":"ref6","article-title":"A Systematic Survey of Prompt Engineering in Large Language Models: Techniques and Applications","author":"Sahoo","year":"2024"},{"issue":"8","key":"ref7","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21236\/ADA456046"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2009.103"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_47"},{"key":"ref11","volume-title":"An Empirical Analysis of Phishing Blacklists","author":"Sheng","year":"2009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102414"},{"key":"ref13","article-title":"A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems","author":"Wu","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref15","article-title":"Spear phishing with large language models","author":"Hazell","year":"2023"},{"key":"ref16","article-title":"Llama: Open and efficient foundation language models","author":"Touvron","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1036\/1097-8542.284200"},{"key":"ref18","volume-title":"Anthropic: Claude"},{"key":"ref19","article-title":"GPT-4 Technical Report","author":"Achiam","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3375882"},{"key":"ref21","article-title":"ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection","author":"Koide","year":"2024"},{"key":"ref22","article-title":"SpamAssassin","volume-title":"Apache"},{"issue":"1","key":"ref23","first-page":"28","article-title":"A comparative analysis between technical and non-technical phishing defenses","volume":"10","author":"Brickley","year":"2021","journal-title":"International Journal of Cyber-Security and Digital Forensics"},{"key":"ref24","article-title":"Spam-t5: Benchmarking large language models for few-shot email spam detection","author":"Labonne","year":"2023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC60891.2024.10427626"},{"key":"ref26","article-title":"Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks","author":"Kang","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00182"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICMI60790.2024.10585821"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IEC47844.2019.8950616"},{"issue":"1","key":"ref30","first-page":"29","article-title":"Using tf-idf to determine word relevance in document queries","volume-title":"Proceedings of the First Instructional Conference on Machine Learning","volume":"242","author":"Ramos"},{"issue":"1","key":"ref31","first-page":"155","volume-title":"Word2Vec. Natural Language Engineering","volume":"23","author":"Church","year":"2017"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/mice.12954"},{"key":"ref33","article-title":"Multitask Prompted Training Enables Zero-Shot Task Generalization","author":"Sanh","year":"2021"},{"key":"ref34","first-page":"22199","article-title":"Large Language Models Are Zero-Shot Reasoners","volume":"35","author":"Kojima","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref35","first-page":"22199","article-title":"Large language models are zero-shot reasoners","volume":"35","author":"Kojima","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref36","first-page":"30378","article-title":"The unreliability of explanations in few-shot prompting for textual reasoning","volume":"35","author":"Ye","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451760"},{"key":"ref38","article-title":"LongLoRA: Efficient Fine-Tuning of Long-Context Large Language Models","author":"Chen","year":"2023"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825018.pdf?arnumber=10825018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:18:21Z","timestamp":1737101901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825018","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}