{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:39:29Z","timestamp":1772933969358,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402600","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"7913-7922","source":"Crossref","is-referenced-by-count":0,"title":["Towards Explainable and Educational Phishing Detection: A Zero-Shot LLM Approach"],"prefix":"10.1109","author":[{"given":"Lu","family":"Zhang","sequence":"first","affiliation":[{"name":"Georgia State University,Department of Computer Science,Atlanta,GA,United States"}]},{"given":"Yubao","family":"Wu","sequence":"additional","affiliation":[{"name":"Georgia State University,Department of Computer Science,Atlanta,GA,United States"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825034"},{"key":"ref2","year":"2025","journal-title":"Phishing activity trends report (q2 2025)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.50"},{"key":"ref4","first-page":"505","article-title":"{PhishDecloaker}: Detecting {CAPTCHA-cloaked} phishing websites via hybrid vision-based interactive models","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Teoh"},{"key":"ref5","first-page":"3793","article-title":"Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Lin"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417233"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"ref8","first-page":"4157","article-title":"Rods with laser beams: understanding browser fingerprinting on phishing pages","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Sanchez-Rola"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.52202\/068431-1800"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"key":"ref13","first-page":"1633","article-title":"Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Liu"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095719"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2011.52"},{"key":"ref17","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International conference on machine learning","author":"Radford"},{"key":"ref18","article-title":"Gpt-4 technical report","author":"Achiam","year":"2023","journal-title":"arXiv preprint"},{"key":"ref19","article-title":"Gemini: a family of highly capable multimodal models","author":"Team","year":"2023","journal-title":"ar Xiv preprint ar Xiv: 2312.11805"},{"key":"ref20","article-title":"Llama 2: Open foundation and fine-tuned chat models","author":"Touvron","year":"2023","journal-title":"arXiv preprint"},{"key":"ref21","first-page":"1877","article-title":"Language mod-els are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref22","article-title":"React: Synergizing reasoning and acting in language models","author":"Yao","year":"2023","journal-title":"ar Xiv preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.52202\/075280-2997"},{"key":"ref24","first-page":"37","article-title":"Can you walk me through it? explainable {SMS} phishing detection using {LLM-based} agents","volume-title":"Twenty-First Symposium on Usable Privacy and Security (SOUPS 2025)","author":"Wang"},{"key":"ref25","volume-title":"Circl phishing dataset 01","year":"2020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60801-3_27"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402600.pdf?arnumber=11402600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:56:29Z","timestamp":1772866589000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402600","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}