{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T12:20:51Z","timestamp":1778156451789,"version":"3.51.4"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/kst.2019.8687615","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T01:24:50Z","timestamp":1555032290000},"page":"232-237","source":"Crossref","is-referenced-by-count":12,"title":["Image Based Phishing Detection Using Transfer Learning"],"prefix":"10.1109","author":[{"given":"Thanathorn","family":"Phoka","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Technology, Faculty of Science, Naresuan University, 65000, Thailand"}]},{"given":"Phisetphong","family":"Suthaphan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, Faculty of Science, Naresuan University, 65000, Thailand"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1391949.1391950"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"ref12","article-title":"Large-scale automatic classification of phishing pages","author":"whittaker","year":"2010","journal-title":"NDSS'10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5421046"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.50"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.59"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2011.52"},{"key":"ref17","article-title":"Transfer learning for material classification using convolutional networks","volume":"abs 1609 6188","author":"wieschollek","year":"2016","journal-title":"CoRR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2535302"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1109\/JCSSE.2018.8457364","article-title":"Transfer learning for leaf classification with convolutional neural networks","author":"esmaeili","year":"2018","journal-title":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_32"},{"key":"ref6","article-title":"Re-thinking the inception architecture for computer vision","volume":"abs 1512 567","author":"szegedy","year":"2015","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"ref7","year":"2018","journal-title":"PhishTank Phishtank out of the net into the tank"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"ref9","article-title":"Client-side defense against web-based identity theft","author":"chou","year":"2004","journal-title":"NDSS"},{"key":"ref20","article-title":"Imagenet large scale visual recognition challenge","volume":"abs 1409 575","author":"russakovsky","year":"2014","journal-title":"CoRR"}],"event":{"name":"2019 11th International Conference on Knowledge and Smart Technology (KST)","location":"Phuket, Thailand","start":{"date-parts":[[2019,1,23]]},"end":{"date-parts":[[2019,1,26]]}},"container-title":["2019 11th International Conference on Knowledge and Smart Technology (KST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8673317\/8687323\/08687615.pdf?arnumber=8687615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:14:43Z","timestamp":1756754083000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8687615\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/kst.2019.8687615","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}