{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:16:01Z","timestamp":1753521361663,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/ijcnn.2019.8852416","type":"proceedings-article","created":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T23:44:32Z","timestamp":1569887072000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples"],"prefix":"10.1109","author":[{"given":"Jing","family":"Ya","sequence":"first","affiliation":[]},{"given":"Tingwen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Panpan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Li","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zhaojun","family":"Gu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"EXPOSURE Finding Malicious Domains Using Passive DNS Analysis","year":"2011","author":"leyla","key":"ref10"},{"key":"ref11","first-page":"1990","article-title":"Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs","author":"weibo","year":"2013","journal-title":"IEEE ICC"},{"key":"ref12","first-page":"1","article-title":"Mining DNS for Malicious Domain Registrations","author":"yuanchen","year":"2010","journal-title":"International Conference on Collaborative Computing Networking Applications and Worksharing (CollaborateCom)"},{"key":"ref13","first-page":"1245","article-title":"Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs","author":"justin","year":"2009","journal-title":"Proc ACM SIGKDD"},{"key":"ref14","first-page":"54","article-title":"Lexical Feature Based Phishing URL Detection Using Online Learning","author":"aaron","year":"2010","journal-title":"ACM workshop on Artificial intelligence and security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014140"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2377295"},{"article-title":"eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys","year":"2017","author":"joshua","key":"ref17"},{"key":"ref18","first-page":"1","article-title":"URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection","author":"hung","year":"2017","journal-title":"Proceedings ACM Conference"},{"article-title":"Beautiful Data: The Stories Behind Elegant Data Solutions","year":"2009","author":"toby","key":"ref19"},{"key":"ref4","first-page":"111","article-title":"On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers","author":"rakesh","year":"2015","journal-title":"ACM Conference on Data and Application Security and Privacy"},{"key":"ref27","first-page":"323","article-title":"Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets","author":"samuel","year":"2016","journal-title":"Proc IEEE ICDCS"},{"key":"ref3","article-title":"Breaking Bad: Detecting Malicious Domains using Word Segmentation","author":"wei","year":"2015","journal-title":"IEEE Web 2 0 Security and Privacy Workshop"},{"article-title":"eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys","year":"2017","author":"saxe","key":"ref6"},{"key":"ref5","first-page":"55","article-title":"What&#x2019;s in a URL: Fast Feature Extraction and Malicious URL Detection","author":"rakesh","year":"2017","journal-title":"Proc International Workshop on Security and Privacy Analytics"},{"article-title":"Malicious URL Detection using Machine Learning: A survey","year":"2017","author":"sahoo","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945048"},{"key":"ref2","first-page":"589","article-title":"Malicious URL Filtering - A Big Data Application","author":"min-sheng","year":"2013","journal-title":"IEEE Big Data"},{"key":"ref9","first-page":"41","article-title":"Behind Phishing: An Examination of Phisher Modi Operandi","author":"kevin","year":"2008","journal-title":"USENIX Workshop on Large-scale Exploits and Emergent Threats"},{"key":"ref1","first-page":"191","article-title":"PhishDef: URL Names Say It All","author":"anh","year":"2011","journal-title":"IEEE International Conference on Computer Communications (INFOCOM)"},{"article-title":"Symbolic, Distributed and Distributional Representations for Natural language Processing in the Era of Deep Learning, a Survey","year":"2017","author":"lorenzo","key":"ref20"},{"key":"ref22","first-page":"1929","article-title":"Dropout: A Simple Way to Prevent Neural Networks from Overfitting","volume":"15","author":"nitish","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"ref21","first-page":"799","article-title":"Bidirectional LSTM Networks for Improved Phoneme Classification and Recognition","author":"alex","year":"2005","journal-title":"International Conference on Artificial Neural Networks"},{"key":"ref24","first-page":"355","article-title":"An Improved Vertical Algorithm for Frequent Itemset Mining from Uncertain Database","author":"junrui","year":"2017","journal-title":"Intelligent Human-Machine Systems and Cybernetics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1074"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"article-title":"Google guide","year":"2005","author":"blachman","key":"ref25"}],"event":{"name":"2019 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2019,7,14]]},"location":"Budapest, Hungary","end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8840768\/8851681\/08852416.pdf?arnumber=8852416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:49:06Z","timestamp":1658080146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8852416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2019.8852416","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}