{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:09:50Z","timestamp":1764842990456,"version":"3.37.3"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T00:00:00Z","timestamp":1737244800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T00:00:00Z","timestamp":1737244800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,19]]},"DOI":"10.1109\/iceic64972.2025.10879662","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:17:22Z","timestamp":1739902642000},"page":"1-3","source":"Crossref","is-referenced-by-count":3,"title":["Improving Messenger Phishing Detection Using Heterogeneous Phishing Data"],"prefix":"10.1109","author":[{"given":"Seokjin","family":"Oh","sequence":"first","affiliation":[{"name":"Hanyang University,Dept. of Applied Artificial Intelligence,Seoul,Republic of Korea"}]},{"given":"Keonwoong","family":"Noh","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept. of Applied Artificial Intelligence,Seoul,Republic of Korea"}]},{"given":"Sunyub","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept. of Computer Science,Ansan,Republic of Korea"}]},{"given":"Dohyung","family":"An","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept. of Computer Science,Ansan,Republic of Korea"}]},{"given":"Woohwan","family":"Jung","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept. of Applied Artificial Intelligence,Seoul,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.367"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy039"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE49692.2020.00045"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/math11143217"},{"key":"ref6","first-page":"28492","article-title":"Robust speech recognition via large-scale weak supervision","volume-title":"International conference on machine learning","author":"Radford","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/vl\/N19-142"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref9","article-title":"Decoupled Weight Decay Regularization","volume-title":"International Conference on Learning Representations","author":"Loshchilov","year":"2019"}],"event":{"name":"2025 International Conference on Electronics, Information, and Communication (ICEIC)","start":{"date-parts":[[2025,1,19]]},"location":"Osaka, Japan","end":{"date-parts":[[2025,1,22]]}},"container-title":["2025 International Conference on Electronics, Information, and Communication (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10879455\/10879601\/10879662.pdf?arnumber=10879662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:00:15Z","timestamp":1740081615000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10879662\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,19]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/iceic64972.2025.10879662","relation":{},"subject":[],"published":{"date-parts":[[2025,1,19]]}}}