{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:59:22Z","timestamp":1776103162559,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DMS 1923142"],"award-info":[{"award-number":["DMS 1923142"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DMS 2123761"],"award-info":[{"award-number":["DMS 2123761"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1932413"],"award-info":[{"award-number":["CNS 1932413"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS 2027750"],"award-info":[{"award-number":["IIS 2027750"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1715458"],"award-info":[{"award-number":["CNS 1715458"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1822118"],"award-info":[{"award-number":["CNS 1822118"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"American Megatrends"},{"name":"Statnett"},{"name":"Cyber Risk Research"},{"name":"ARL"},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The NewPush"},{"DOI":"10.13039\/100000074","name":"U.S. Department of Justice","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000074","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Office of Justice Programs\/National Institute of Justice","award":["2017-ZA-CX-0002"],"award-info":[{"award-number":["2017-ZA-CX-0002"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tsc.2023.3234806","type":"journal-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T19:36:20Z","timestamp":1673292980000},"page":"2411-2422","source":"Crossref","is-referenced-by-count":40,"title":["Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2721-0628","authenticated-orcid":false,"given":"Hossein","family":"Shirazi","sequence":"first","affiliation":[{"name":"Management Information Systems, San Diego State University, San Diego, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1052-7987","authenticated-orcid":false,"given":"Shashika R.","family":"Muramudalige","sequence":"additional","affiliation":[{"name":"Department of Electrical &#x0026; Computer Engineering, Colorado State University, Fort Collins, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0714-7676","authenticated-orcid":false,"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado State University, Fort Collins, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8335-655X","authenticated-orcid":false,"given":"Anura P.","family":"Jayasumana","sequence":"additional","affiliation":[{"name":"Department of Electrical &#x0026; Computer Engineering, Colorado State University, Fort Collins, CO, USA"}]},{"given":"Haonan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Statistics, Colorado State University, Fort Collins, CO, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205992"},{"key":"ref57","article-title":"UCI machine learning repository","author":"dheeru","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref56","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.03.019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2377295"},{"key":"ref14","first-page":"492","article-title":"An assessment of features related to phishing websites using an automated technique","author":"rami","year":"2012","journal-title":"Proc Int Conf Internet Technol Secured Trans"},{"key":"ref58","article-title":"Phishstorm - phishing \/ legitimate url dataset. aalto university","author":"marchal","year":"0"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007577"},{"key":"ref52","first-page":"5767","article-title":"Improved training of wasserstein gans","volume":"30","author":"gulrajani","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BADGERS.2014.11"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2752087"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080522"},{"key":"ref17","article-title":"Web page phishing detection","author":"yahiouche","year":"2020"},{"key":"ref16","article-title":"Phishing dataset for machine learning: Feature evaluation","author":"tan","year":"2018"},{"key":"ref19","article-title":"Datasets for phishing websites detection","volume":"33","author":"vrban?i?","year":"2020","journal-title":"Data Brief"},{"key":"ref18","article-title":"Phishing dataset for machine learning: Feature evaluation","author":"vrban?i?","year":"2020"},{"key":"ref51","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref50","article-title":"Adversarial autoencoders","author":"makhzani","year":"2016"},{"key":"ref46","article-title":"A comparative study of complex data object generation with likelihood and deep generative approaches","author":"muramudalige","year":"2023"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2018.1492819"},{"key":"ref48","article-title":"Recent advance in temporal point process: From machine learning perspective","author":"yan","year":"2019"},{"key":"ref47","first-page":"2672","article-title":"Generative adversarial networks","author":"goodfellow","year":"2014","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref42","article-title":"Privacy-preserving generative deep neural networks support clinical data sharing","volume":"12","author":"brett","year":"2019","journal-title":"Circulation: Cardiovascular Quality and Outcomes"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/GC46384.2019.00017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM51794.2021.00034"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.23876\/j.krcp.2017.36.1.3"},{"key":"ref49","article-title":"Generating multi-label discrete patient records using generative adversarial networks","author":"choi","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0414-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1361-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2015.49"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2012.60"},{"key":"ref6","author":"sahingoz","year":"2019","journal-title":"Mach Learn Based Phishing Detection From Urls Expert Syst Appl"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587410"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2938787"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_5"},{"key":"ref34","article-title":"Active learning literature survey","author":"settles","year":"2009"},{"key":"ref37","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"hu","year":"2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_11"},{"key":"ref31","article-title":"Semi-supervised conditional GAN for simultaneous generation and detection of phishing URLs: A game theoretic perspective","author":"kamran","year":"2021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168235"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-12-8"},{"key":"ref32","first-page":"423","article-title":"A machine-learning based unbiased phishing detection approach","author":"haynes","year":"2021","journal-title":"Proc 18th Int Conf Mobile Syst Pervasive Comput"},{"key":"ref2","article-title":"Business e-mail compromise 12 billion dollar scam","year":"0"},{"key":"ref1","first-page":"1273","article-title":"Detecting and characterizing lateral phishing at scale","author":"ho","year":"2019","journal-title":"Proc Usenix Secur Symp"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2018.09.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00023"},{"key":"ref24","article-title":"Malware webpages data","author":"hanif","year":"2020"},{"key":"ref23","article-title":"A drift aware adaptive method based on minimum uncertainty for anomaly detection in social networking","volume":"162","author":"yazdi","year":"2020","journal-title":"Expert Syst Appl"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697412"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33432-1_12"},{"key":"ref20","article-title":"Phishing dataset for machine learning: Feature evaluation","author":"adebowale","year":"2019"},{"key":"ref22","article-title":"Data for: An online minimal uncertainty drift-aware method for anomaly detection in social networking","author":"yazdi","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.07.067"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.02.251"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.794"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5220\/0009834204230430"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4629386\/10213383\/10012332-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/10213383\/10012332.pdf?arnumber=10012332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:59:10Z","timestamp":1693245550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10012332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":59,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2023.3234806","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}