{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:06:07Z","timestamp":1766048767399,"version":"3.41.0"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":61,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T00:00:00Z","timestamp":1460332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["91418206","61472429","61170240"],"award-info":[{"award-number":["91418206","61472429","61170240"]}]},{"name":"National Science and Technology Major Project of China","award":["2012ZX01039-004"],"award-info":[{"award-number":["2012ZX01039-004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,11]]},"DOI":"10.1145\/2872427.2883060","type":"proceedings-article","created":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T20:35:52Z","timestamp":1485203752000},"page":"345-356","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Cracking Classifiers for Evasion"],"prefix":"10.1145","author":[{"given":"Bin","family":"Liang","sequence":"first","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"given":"Miaoqiang","family":"Su","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"given":"Gang","family":"Yang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Brute Force Attack. https:\/\/en.wikipedia.org\/wiki\/Brute-force_attack  Brute Force Attack. https:\/\/en.wikipedia.org\/wiki\/Brute-force_attack"},{"key":"e_1_3_2_1_2_1","unstructured":"Google has over a billion users of Android Chrome YouTube and search. http:\/\/www.theverge.com\/2015\/5\/28\/8676599\/google-io-2015-vital-statistics  Google has over a billion users of Android Chrome YouTube and search. http:\/\/www.theverge.com\/2015\/5\/28\/8676599\/google-io-2015-vital-statistics"},{"key":"e_1_3_2_1_3_1","unstructured":"PhishTank. https:\/\/www.phishtank.com\/  PhishTank. https:\/\/www.phishtank.com\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Phishing Attack Trends Report of the 4th Quarter in 2014. http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2014.pdf  Phishing Attack Trends Report of the 4th Quarter in 2014. http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2014.pdf"},{"key":"e_1_3_2_1_5_1","unstructured":"Design Documents of Safe Browsing. http:\/\/www.Chromium.org\/developers\/design-documents\/safebrowsing  Design Documents of Safe Browsing. http:\/\/www.Chromium.org\/developers\/design-documents\/safebrowsing"},{"key":"e_1_3_2_1_6_1","unstructured":"Market share of popular web browsers from Aug 2014 to Aug 2015. http:\/\/gs.statcounter.com\/#browser-ww-monthly-201408--201508  Market share of popular web browsers from Aug 2014 to Aug 2015. http:\/\/gs.statcounter.com\/#browser-ww-monthly-201408--201508"},{"key":"e_1_3_2_1_7_1","unstructured":"Google's Safe Browsing service protects 1 billion Chrome Firefox and Safari users from malware and phishing. http:\/\/thenextweb.com\/google\/2013\/06\/25\/googles-safe-browsing-service-now-protects-1-billion-Chrome-firefox-and-safari-users-from-malware-and-phishing\/  Google's Safe Browsing service protects 1 billion Chrome Firefox and Safari users from malware and phishing. http:\/\/thenextweb.com\/google\/2013\/06\/25\/googles-safe-browsing-service-now-protects-1-billion-Chrome-firefox-and-safari-users-from-malware-and-phishing\/"},{"volume-title":"Proceedings of the 4th PKDD's Workshop on Machine Learning and Textual Information Access.","year":"2000","author":"Androutsopoulos I.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"volume-title":"Fast and Portable Dynamic Translator. USENIX Annual Technical Conference, FREENIX Track.","year":"2005","author":"Bellard F.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89689-0_54"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02326-2_14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0007-7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12127-2_8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083796"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34166-3_46"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613006"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517321"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020495"},{"volume-title":"Static prediction games for adversarial learning problems. The Journal of Machine Learning Research. JMLR'2012","author":"Br\u00fcckner M.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456424.1456434"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. NDSS'2004","author":"Chou N.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.50"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143889"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. NDSS'2008","author":"Holz T.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"issue":"4","key":"e_1_3_2_1_33_1","first-page":"2091","article-title":"Phishing detection: a literature survey. Communications Surveys & Tutorials. 2013","volume":"15","author":"Khonji M.","journal-title":"IEEE"},{"volume-title":"Proceedings of Neural Information Processing Systems (NIPS) Workshop on Machine Learning in Adversarial Environments for Computer Security.","year":"2007","author":"Kloft P.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900035"},{"volume-title":"Proceedings of the 6th Conference on Email and Anti-Spam. CEAS'2009","author":"Ko\u0142cz A.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.335"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1704175.1704190"},{"volume-title":"Proceedings of the 2nd Conference on Email and Anti-Spam. CEAS'2005","author":"Lowd D.","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484327"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"volume-title":"Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats. LEET'2008","author":"Nelson B.","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_36"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833585"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. NDSS'2013","author":"Rajab M. A.","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.010"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639562.1639592"},{"volume-title":"Introduction to modern information retrieval","year":"1983","author":"Salton G.","key":"e_1_3_2_1_50_1"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. NDSS'2011","author":"Slowinska A.","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.20"},{"volume-title":"Phishing detection using classifier ensembles. eCrime Researchers Summit. eCRIME'2009","author":"Toolan F.","key":"e_1_3_2_1_53_1"},{"volume-title":"Data Mining Problem-oriented Seminar","year":"2004","author":"Tretyakov K.","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.13"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium. NDSS'2010","author":"Whittaker C.","key":"e_1_3_2_1_58_1"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2161999"}],"event":{"name":"WWW '16: 25th International World Wide Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Montr\u00e9al Qu\u00e9bec Canada","acronym":"WWW '16"},"container-title":["Proceedings of the 25th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872427.2883060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872427.2883060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:07Z","timestamp":1750221547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872427.2883060"}},"subtitle":["A Case Study on the Google's Phishing Pages Filter"],"short-title":[],"issued":{"date-parts":[[2016,4,11]]},"references-count":61,"alternative-id":["10.1145\/2872427.2883060","10.5555\/2872427"],"URL":"https:\/\/doi.org\/10.1145\/2872427.2883060","relation":{},"subject":[],"published":{"date-parts":[[2016,4,11]]},"assertion":[{"value":"2016-04-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}