{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:43:30Z","timestamp":1761129810676,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,3]]},"DOI":"10.1109\/ccci49893.2020.9256804","type":"proceedings-article","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T16:49:34Z","timestamp":1605718174000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["PhishGAN: Data Augmentation and Identification of Homoglyph Attacks"],"prefix":"10.1109","author":[{"given":"Lee Joon","family":"Sern","sequence":"first","affiliation":[]},{"given":"Yam Gui","family":"Peng David","sequence":"additional","affiliation":[]},{"given":"Chan Jin","family":"Hao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1125","article-title":"Image-to-image translation with conditional adversarial networks","author":"phillip","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref3","first-page":"22","article-title":"Detecting homoglyph attacks with a siamese neural network","author":"jonathan","year":"0","journal-title":"2018 IEEE Security and Privacy Workshops (SPW) SPW"},{"journal-title":"In defense of the triplet loss for person re-identification","year":"2017","author":"alexander","key":"ref10"},{"key":"ref6","first-page":"2223","article-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks","author":"jun-yan","year":"0","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"key":"ref5","article-title":"Deep residual learning for image recognition","volume":"abs 1512 3385","author":"kaiming","year":"2015","journal-title":"CoRR"},{"key":"ref8","article-title":"Neural style transfer: A review","author":"yongcheng","year":"2019","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"ref7","article-title":"Sampling matters in deep embedding learning","volume":"abs 1706 7567","author":"chao-yuan","year":"2017","journal-title":"CoRR"},{"key":"ref2","article-title":"Shamfinder: An automated framework for detecting idn homographs","author":"hiroaki","year":"0","journal-title":"ACM Internet Measurement Conference"},{"key":"ref9","first-page":"815","article-title":"Facenet: A unified embedding for face recognition and clustering","author":"florian","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"}],"event":{"name":"2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","start":{"date-parts":[[2020,11,3]]},"location":"Sharjah, United Arab Emirates","end":{"date-parts":[[2020,11,5]]}},"container-title":["2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9256400\/9256405\/09256804.pdf?arnumber=9256804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:49:04Z","timestamp":1656438544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9256804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,3]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/ccci49893.2020.9256804","relation":{},"subject":[],"published":{"date-parts":[[2020,11,3]]}}}