{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:12:05Z","timestamp":1740100325020,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T00:00:00Z","timestamp":1627430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T00:00:00Z","timestamp":1627430400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T00:00:00Z","timestamp":1627430400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971366,61731012"],"award-info":[{"award-number":["61971366,61731012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the central universities","doi-asserted-by":"publisher","award":["20720200077"],"award-info":[{"award-number":["20720200077"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,28]]},"DOI":"10.1109\/iccc52777.2021.9580433","type":"proceedings-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T23:22:03Z","timestamp":1636413723000},"page":"17-22","source":"Crossref","is-referenced-by-count":1,"title":["Reinforcement Learning Based Accurate Detection of Malicious URLs with Multi-Feature Analysis"],"prefix":"10.1109","author":[{"given":"Xiaoyue","family":"Wan","sequence":"first","affiliation":[]},{"given":"Pengmin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuhuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"3068","DOI":"10.1109\/TVT.2020.2967026","article-title":"Reinforcement learning based PHY authentication for VANETs","volume":"69","author":"xiao","year":"2020","journal-title":"IEEE Trans Vehicular Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"ref14","first-page":"134","article-title":"Phishing detection method based on URL features","volume":"29","author":"cao","year":"2013","journal-title":"Journal of Southeast University"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2977886"},{"key":"ref16","first-page":"1","article-title":"Urlnet: Learning a URL representation with deep learning for malicious url detection","author":"le","year":"2018","journal-title":"arX iv"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895751"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254503"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.12783\/dtcse\/mso2018\/20499"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2018.094367"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3007742"},{"key":"ref2","first-page":"1","article-title":"Malicious URL detection using machine learning: A survey","author":"sahoo","year":"2017","journal-title":"ArXiv"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2575828"}],"event":{"name":"2021 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2021,7,28]]},"location":"Xiamen, China","end":{"date-parts":[[2021,7,30]]}},"container-title":["2021 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579484\/9580191\/09580433.pdf?arnumber=9580433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:52Z","timestamp":1652201752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9580433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,28]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iccc52777.2021.9580433","relation":{},"subject":[],"published":{"date-parts":[[2021,7,28]]}}}