{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:54:40Z","timestamp":1774558480857,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2026.3652563","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:00:29Z","timestamp":1768255229000},"page":"211-222","source":"Crossref","is-referenced-by-count":0,"title":["QFedPhish: A Quantum-Inspired Federated Learning Approach for Detecting AI-Generated Phishing Attacks"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2964-5563","authenticated-orcid":false,"given":"Abdul","family":"Malik","sequence":"first","affiliation":[{"name":"Higher Education Department, Government College of Management Sciences Timergara, Timergara, Khyber Pakhtunkhwa, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4268-3482","authenticated-orcid":false,"given":"Saeed Mian","family":"Qaisar","sequence":"additional","affiliation":[{"name":"College of Engineering and Technology, American University of the Middle East, Egaila, Kuwait"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.30574\/gjeta.2024.20.3.0164"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060"},{"issue":"2","key":"ref3","article-title":"Exploring phishing attacks in the AI age: A comprehensive literature review","volume":"7","author":"Liaqat","year":"2024","journal-title":"J. Comput. Biomed. Informat."},{"key":"ref4","article-title":"Assessing AI vs human-authored spear phishing SMS attacks: An empirical study using the trapd method","author":"Francia","year":"2024","journal-title":"arXiv:2406.13049"},{"key":"ref5","article-title":"The shadow of fraud: The emerging danger of AI-powered social engineering and its possible cure","author":"Yu","year":"2024","journal-title":"arXiv:2407.15912"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2025.107877"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315746"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3373-0832-6.ch025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3233793"},{"key":"ref12","article-title":"A comprehensive overview of large language models (LLMs) for cyber defences: Opportunities and directions","author":"Hassanin","year":"2024","journal-title":"arXiv:2405.14487"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.028"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.352"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4678746"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991403"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.04.023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102328"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/pr10071356"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/app13095275"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.051778"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-032-00071-2_40"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14132611"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.122.040504"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3470243"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.aop.2014.06.013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3571029"},{"key":"ref29","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","author":"Tian"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref31","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"ref33","volume-title":"The Online Phishing Corpus","author":"Nazario","year":"2025"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2025.111726"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11345159.pdf?arnumber=11345159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:51:26Z","timestamp":1774554686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11345159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":34,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2026.3652563","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}