{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:39:10Z","timestamp":1767339550677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-20-1-0254"],"award-info":[{"award-number":["W911NF-20-1-0254"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1433817,1838147"],"award-info":[{"award-number":["1433817,1838147"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-19-S-F009"],"award-info":[{"award-number":["N00014-19-S-F009"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511524","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Leveraging Synthetic Data and PU Learning For Phishing Email Detection"],"prefix":"10.1145","author":[{"given":"Fatima Zahra","family":"Qachfar","sequence":"first","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Rakesh M.","family":"Verma","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Arjun","family":"Mukherjee","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969780"},{"key":"e_1_3_2_1_2_1","unstructured":"Ayman El Aassal Luis Moraes Shahryar Baki Avisha Das and Rakesh Verma. 2018. Anti-Phishing Pilot at ACM IWSPA 2018 Evaluating Performance with New Metrics for Unbalanced Datasets See [41] 2--10. http:\/\/ceur-ws.org\/Vol2124\/#anti-phishing-pilot  Ayman El Aassal Luis Moraes Shahryar Baki Avisha Das and Rakesh Verma. 2018. Anti-Phishing Pilot at ACM IWSPA 2018 Evaluating Performance with New Metrics for Unbalanced Datasets See [41] 2--10. http:\/\/ceur-ws.org\/Vol2124\/#anti-phishing-pilot"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100168"},{"key":"e_1_3_2_1_4_1","unstructured":"Apache. 2018. Spam Assassin. Apache Software Foundation. https:\/\/spamassassin. apache.org\/old\/publiccorpus\/  Apache. 2018. Spam Assassin. Apache Software Foundation. https:\/\/spamassassin. apache.org\/old\/publiccorpus\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Longformer: The longdocument transformer. arXiv preprint arXiv:2004.05150","author":"Beltagy Iz","year":"2020","unstructured":"Iz Beltagy , Matthew E Peters , and Arman Cohan . 2020 . Longformer: The longdocument transformer. arXiv preprint arXiv:2004.05150 (2020). Iz Beltagy, Matthew E Peters, and Arman Cohan. 2020. Longformer: The longdocument transformer. arXiv preprint arXiv:2004.05150 (2020)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-14-106"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469205"},{"key":"e_1_3_2_1_9_1","volume-title":"2020 Internet Crime Report Released","author":"Internet Crime Complaint Center","year":"2020","unstructured":"Internet Crime Complaint Center . 2021. 2020 Internet Crime Report Released . Federal Bureau of Investigation . https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/ 2020 _IC3Report.pdf Internet Crime Complaint Center. 2021. 2020 Internet Crime Report Released. Federal Bureau of Investigation. https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/ 2020_IC3Report.pdf"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.03.050"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2957750"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. 2019 NAACL-HLT","volume":"1","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2019 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding . In Proc. 2019 NAACL-HLT 2019, Vol. 1 (Long and Short Papers). 4171--4186. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proc. 2019 NAACL-HLT 2019, Vol. 1 (Long and Short Papers). 4171--4186."},{"key":"e_1_3_2_1_14_1","volume-title":"Phishing Email Detection Using Robust NLP Techniques. In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). 7--12","author":"Egozi Gal","year":"2018","unstructured":"Gal Egozi and Rakesh Verma . 2018 . Phishing Email Detection Using Robust NLP Techniques. In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). 7--12 . https:\/\/doi.org\/10.1109\/ICDMW.2018.00009 10.1109\/ICDMW.2018.00009 Gal Egozi and Rakesh Verma. 2018. Phishing Email Detection Using Robust NLP Techniques. In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). 7--12. https:\/\/doi.org\/10.1109\/ICDMW.2018.00009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401920"},{"key":"e_1_3_2_1_16_1","volume-title":"Manuel Blum, and Frank Hutter.","author":"Feurer Matthias","year":"2019","unstructured":"Matthias Feurer , Aaron Klein , Katharina Eggensperger , Jost Tobias Springenberg , Manuel Blum, and Frank Hutter. 2019 . Auto-sklearn : Efficient and Robust Automated Machine Learning. In Automated Machine Learning - Methods, Systems, Challenges, Frank Hutter, Lars Kotthoff, and Joaquin Vanschoren (Eds.). Springer , 113--134. https:\/\/doi.org\/10.1007\/978--3-030-05318--5_6 10.1007\/978--3-030-05318--5_6 Matthias Feurer, Aaron Klein, Katharina Eggensperger, Jost Tobias Springenberg, Manuel Blum, and Frank Hutter. 2019. Auto-sklearn: Efficient and Robust Automated Machine Learning. In Automated Machine Learning - Methods, Systems, Challenges, Frank Hutter, Lars Kotthoff, and Joaquin Vanschoren (Eds.). Springer, 113--134. https:\/\/doi.org\/10.1007\/978--3-030-05318--5_6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09814-9"},{"key":"e_1_3_2_1_18_1","unstructured":"Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David WardeFarley Sherjil Ozair Aaron C. Courville and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in NIPS. 2672--2680. https:\/\/proceedings.neurips. cc\/paper\/2014\/hash\/5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html  Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David WardeFarley Sherjil Ozair Aaron C. Courville and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in NIPS. 2672--2680. https:\/\/proceedings.neurips. cc\/paper\/2014\/hash\/5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. 32nd AAAI-18","author":"Guo Jiaxian","year":"2018","unstructured":"Jiaxian Guo , Sidi Lu , Han Cai , Weinan Zhang , Yong Yu , and Jun Wang . 2018 . Long Text Generation via Adversarial Training with Leaked Information . In Proc. 32nd AAAI-18 , the 30th IAAI-18, and the 8th AAAI EAAI-18. 5141--5148. Jiaxian Guo, Sidi Lu, Han Cai, Weinan Zhang, Yong Yu, and Jun Wang. 2018. Long Text Generation via Adversarial Training with Leaked Information. In Proc. 32nd AAAI-18, the 30th IAAI-18, and the 8th AAAI EAAI-18. 5141--5148."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. 2019 NAACL-HLT","volume":"1","author":"Akmal Haidar Md.","year":"2019","unstructured":"Md. Akmal Haidar , Mehdi Rezagholizadeh , Alan Do-Omri , and Ahmad Rashid . 2019 . Latent Code and Text-based Generative Adversarial Networks for Soft-text Generation . In Proc. 2019 NAACL-HLT 2019, Volume 1 (Long and Short Papers). 2248--2258. Md. Akmal Haidar, Mehdi Rezagholizadeh, Alan Do-Omri, and Ahmad Rashid. 2019. Latent Code and Text-based Generative Adversarial Networks for Soft-text Generation. In Proc. 2019 NAACL-HLT 2019, Volume 1 (Long and Short Papers). 2248--2258."},{"key":"e_1_3_2_1_21_1","volume-title":"Verma","author":"Hatua Amartya","year":"2021","unstructured":"Amartya Hatua , Arjun Mukherjee , and Rakesh M . Verma . 2021 . On the Feasibility of Using GANs for Claim Verification- Experiments and Analysis. In Proc. Reducing Online Misinformation Through Credible Information Retrieval Workshop (ROMCIR 2021) (CEUR Workshop Proceedings , Vol. 2838). 35-- 46 . Amartya Hatua, Arjun Mukherjee, and Rakesh M. Verma. 2021. On the Feasibility of Using GANs for Claim Verification- Experiments and Analysis. In Proc. Reducing Online Misinformation Through Credible Information Retrieval Workshop (ROMCIR 2021) (CEUR Workshop Proceedings, Vol. 2838). 35--46."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7753\/IJCATR0309.1012"},{"key":"e_1_3_2_1_23_1","volume-title":"The Enron Corpus: A New Dataset for Email Classification Research. In Machine Learning: ECML 2004, 15th European Conference on Machine, Proceedings (LNCS","volume":"226","author":"Klimt Bryan","year":"2004","unstructured":"Bryan Klimt and Yiming Yang . 2004 . The Enron Corpus: A New Dataset for Email Classification Research. In Machine Learning: ECML 2004, 15th European Conference on Machine, Proceedings (LNCS , Vol. 3201). Springer, 217-- 226 . https: \/\/doi.org\/10.1007\/978--3--540--30115--8_22 10.1007\/978--3--540--30115--8_22 Bryan Klimt and Yiming Yang. 2004. The Enron Corpus: A New Dataset for Email Classification Research. In Machine Learning: ECML 2004, 15th European Conference on Machine, Proceedings (LNCS, Vol. 3201). Springer, 217--226. https: \/\/doi.org\/10.1007\/978--3--540--30115--8_22"},{"key":"e_1_3_2_1_24_1","volume-title":"ADMA 2014, Guilin, China, December 19--21, 2014. Proceedings (Lecture Notes in Computer Science","volume":"587","author":"Li Chen","year":"2014","unstructured":"Chen Li and Xue-Liang Hua . 2014 . Towards Positive Unlabeled Learning for Parallel Data Mining: A Random Forest Framework. In Advanced Data Mining and Applications - 10th International Conference , ADMA 2014, Guilin, China, December 19--21, 2014. Proceedings (Lecture Notes in Computer Science , Vol. 8933), Xudong Luo, Jeffrey Xu Yu, and Zhi Li (Eds.). Springer, 573-- 587 . https:\/\/doi.org\/10.1007\/978- 3--319--14717--8_45 10.1007\/978- Chen Li and Xue-Liang Hua. 2014. Towards Positive Unlabeled Learning for Parallel Data Mining: A Random Forest Framework. In Advanced Data Mining and Applications - 10th International Conference, ADMA 2014, Guilin, China, December 19--21, 2014. Proceedings (Lecture Notes in Computer Science, Vol. 8933), Xudong Luo, Jeffrey Xu Yu, and Zhi Li (Eds.). Springer, 573--587. https:\/\/doi.org\/10.1007\/978- 3--319--14717--8_45"},{"key":"e_1_3_2_1_25_1","volume-title":"RoBERTa: A Robustly Optimized BERT Pretraining Approach. CoRR abs\/1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu , Myle Ott , Naman Goyal , Jingfei Du , Mandar Joshi , Danqi Chen , Omer Levy , Mike Lewis , Luke Zettlemoyer , and Veselin Stoyanov . 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. CoRR abs\/1907.11692 ( 2019 ). arXiv:1907.11692 http:\/\/arxiv.org\/abs\/1907.11692 Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. CoRR abs\/1907.11692 (2019). arXiv:1907.11692 http:\/\/arxiv.org\/abs\/1907.11692"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.06.010"},{"key":"e_1_3_2_1_27_1","unstructured":"Jose Nazario. 2007. Phishing corpus.  Jose Nazario. 2007. Phishing corpus."},{"key":"e_1_3_2_1_28_1","volume-title":"Moore","author":"Olson Randal S.","year":"2019","unstructured":"Randal S. Olson and Jason H . Moore . 2019 . TPOT : A Tree-Based Pipeline Optimization Tool for Automating Machine Learning. In Automated Machine Learning - Methods, Systems, Challenges, Frank Hutter, Lars Kotthoff, and Joaquin Vanschoren (Eds.). Springer , 151--160. https:\/\/doi.org\/10.1007\/978--3-030-05318--5_8 10.1007\/978--3-030-05318--5_8 Randal S. Olson and Jason H. Moore. 2019. TPOT: A Tree-Based Pipeline Optimization Tool for Automating Machine Learning. In Automated Machine Learning - Methods, Systems, Challenges, Frank Hutter, Lars Kotthoff, and Joaquin Vanschoren (Eds.). Springer, 151--160. https:\/\/doi.org\/10.1007\/978--3-030-05318--5_8"},{"key":"e_1_3_2_1_29_1","volume-title":"RAT: Research Assistant Tool.","author":"Qachfar Fatima Zahra","year":"2022","unstructured":"Fatima Zahra Qachfar and Rakesh Verma . 2022 . RAT: Research Assistant Tool. (2022). unpublished, under reviewing. Fatima Zahra Qachfar and Rakesh Verma. 2022. RAT: Research Assistant Tool. (2022). unpublished, under reviewing."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. 1st AntiPhishing Shared Pilot 4th ACM Int. Workshop Secur. Privacy Anal.(IWSPA)","author":"Ra Vinayakumar","year":"2018","unstructured":"Vinayakumar Ra , Barathi Ganesh H Ba , Anand Kumar Ma , Soman K Pa , Prabaharan Poornachandran , and A Verma . 2018 . DeepAnti-PhishNet: Applying deep neural networks for phishing email detection . In Proc. 1st AntiPhishing Shared Pilot 4th ACM Int. Workshop Secur. Privacy Anal.(IWSPA) . Tempe, AZ, USA, 1--11. Vinayakumar Ra, Barathi Ganesh HBa, Anand Kumar Ma, Soman KPa, Prabaharan Poornachandran, and A Verma. 2018. DeepAnti-PhishNet: Applying deep neural networks for phishing email detection. In Proc. 1st AntiPhishing Shared Pilot 4th ACM Int. Workshop Secur. Privacy Anal.(IWSPA). Tempe, AZ, USA, 1--11."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1035"},{"key":"e_1_3_2_1_32_1","unstructured":"Google Research. 2019. BERT Github Repository. https:\/\/github.com\/googleresearch\/bert  Google Research. 2019. BERT Github Repository. https:\/\/github.com\/googleresearch\/bert"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-021-09401-z"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6289079"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1162"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423617"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.08.051"},{"key":"e_1_3_2_1_38_1","volume-title":"FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning. ArXiv abs\/2007.13300","author":"Thapa Chandra","year":"2020","unstructured":"Chandra Thapa , Jun Tang , Sharif Abuadbba , Yansong Gao , Yifeng Zheng , Seyit Ahmet \u00c7amtepe , Surya Nepal , and Mahathir Almashor . 2020. FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning. ArXiv abs\/2007.13300 ( 2020 ). Chandra Thapa, Jun Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit Ahmet \u00c7amtepe, Surya Nepal, and Mahathir Almashor. 2020. FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning. ArXiv abs\/2007.13300 (2020)."},{"key":"e_1_3_2_1_39_1","first-page":"769","article-title":"Two Modifications of CNN","volume":"11","author":"Tomek I.","year":"1976","unstructured":"I. Tomek . 1976 . Two Modifications of CNN . IEEE Transactions on Systems, Man, and Cybernetics SMC-6 , 11 (1976), 769 -- 772 . I. Tomek. 1976. Two Modifications of CNN. IEEE Transactions on Systems, Man, and Cybernetics SMC-6, 11 (1976), 769--772.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics SMC-6"},{"key":"e_1_3_2_1_40_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing Data using t-SNE . Journal of Machine Learning Research 9 , 86 (2008), 2579 -- 2605 . http: \/\/jmlr.org\/papers\/v9\/vandermaaten08a.html Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of Machine Learning Research 9, 86 (2008), 2579--2605. http: \/\/jmlr.org\/papers\/v9\/vandermaaten08a.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 1st Anti-Phishing Shared Task at 4th ACM IWSPA (IWSPA-AP). Number 2124 in CEUR Workshop Proceedings. Aachen. http:\/\/ceur-ws.org\/Vol-2124\/","author":"Verma Rakesh","year":"2018","unstructured":"Rakesh Verma and Avisha Das ( Eds .). 2018 . Proceedings of the 1st Anti-Phishing Shared Task at 4th ACM IWSPA (IWSPA-AP). Number 2124 in CEUR Workshop Proceedings. Aachen. http:\/\/ceur-ws.org\/Vol-2124\/ Rakesh Verma and Avisha Das (Eds.). 2018. Proceedings of the 1st Anti-Phishing Shared Task at 4th ACM IWSPA (IWSPA-AP). Number 2124 in CEUR Workshop Proceedings. Aachen. http:\/\/ceur-ws.org\/Vol-2124\/"},{"volume-title":"Cybersecurity analytics","author":"Verma Rakesh M","key":"e_1_3_2_1_42_1","unstructured":"Rakesh M Verma and David J Marchette . 2019. Cybersecurity analytics . CRC Press . Rakesh M Verma and David J Marchette. 2019. Cybersecurity analytics. CRC Press."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/1740-9713.01569"},{"key":"e_1_3_2_1_44_1","volume-title":"Fundamental Algorithms for Scientific Computing in Python. Nature Methods 17","author":"Virtanen Pauli","year":"2020","unstructured":"Pauli Virtanen , Ralf Gommers , Travis E. Oliphant , Matt Haberland , Tyler Reddy , David Cournapeau , Evgeni Burovski , Pearu Peterson , Warren Weckesser , Jonathan Bright , St\u00e9fan J. van der Walt , Matthew Brett , Joshua Wilson , K. Jarrod Millman , Nikolay Mayorov , Andrew R. J. Nelson , Eric Jones , Robert Kern , Eric Larson , C J Carey , ?lhan Polat, Yu Feng , Eric W. Moore , Jake VanderPlas , Denis Laxalde , Josef Perktold , Robert Cimrman , Ian Henriksen , E. A. Quintero , Charles R. Harris , Anne M. Archibald , Ant\u00f4nio H. Ribeiro , Fabian Pedregosa , Paul van Mulbregt , and SciPy 1.0 Contributors . 2020. SciPy 1.0 : Fundamental Algorithms for Scientific Computing in Python. Nature Methods 17 ( 2020 ). Pauli Virtanen, Ralf Gommers, Travis E. Oliphant, Matt Haberland, Tyler Reddy, David Cournapeau, Evgeni Burovski, Pearu Peterson, Warren Weckesser, Jonathan Bright, St\u00e9fan J. van der Walt, Matthew Brett, Joshua Wilson, K. Jarrod Millman, Nikolay Mayorov, Andrew R. J. Nelson, Eric Jones, Robert Kern, Eric Larson, C J Carey, ?lhan Polat, Yu Feng, Eric W. Moore, Jake VanderPlas, Denis Laxalde, Josef Perktold, Robert Cimrman, Ian Henriksen, E. A. Quintero, Charles R. Harris, Anne M. Archibald, Ant\u00f4nio H. Ribeiro, Fabian Pedregosa, Paul van Mulbregt, and SciPy 1.0 Contributors. 2020. SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python. Nature Methods 17 (2020)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102372"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2010.44"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.3115\/1708124.1708133"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. 31st AAAI Conf. on Artificial Intelligence. AAAI Press, 2852--2858","author":"Yu Lantao","year":"2017","unstructured":"Lantao Yu , Weinan Zhang , Jun Wang , and Yong Yu . 2017 . SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient . In Proc. 31st AAAI Conf. on Artificial Intelligence. AAAI Press, 2852--2858 . Lantao Yu, Weinan Zhang, Jun Wang, and Yong Yu. 2017. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient. In Proc. 31st AAAI Conf. on Artificial Intelligence. AAAI Press, 2852--2858."},{"volume-title":"Proc. 2020 ACM SIGSAC Conf. on Computer and Communications Security. 2077--2079","author":"Zeng Victor","key":"e_1_3_2_1_50_1","unstructured":"Victor Zeng , Xin Zhou , Shahryar Baki , and Rakesh M. Verma . 2020. PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing . In Proc. 2020 ACM SIGSAC Conf. on Computer and Communications Security. 2077--2079 . Victor Zeng, Xin Zhou, Shahryar Baki, and Rakesh M. Verma. 2020. PhishBench 2.0: A Versatile and Extendable Benchmarking Framework for Phishing. In Proc. 2020 ACM SIGSAC Conf. on Computer and Communications Security. 2077--2079."}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511524","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511524","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511524"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":50,"alternative-id":["10.1145\/3508398.3511524","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511524","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}