{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T11:02:32Z","timestamp":1778065352890,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568629","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"134-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Leveraging Deep Learning Image Classifiers for Visual Similarity-based Phishing Website Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6585-6171","authenticated-orcid":false,"given":"Nguyen Bac","family":"Trinh","sequence":"first","affiliation":[{"name":"University of Information Technology, Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5945-3712","authenticated-orcid":false,"given":"The Duy","family":"Phan","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3147-3356","authenticated-orcid":false,"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Information Technology, Vietnam National University, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"#cr-split#-e_1_3_2_1_1_1.1","doi-asserted-by":"crossref","unstructured":"Sahar Abdelnabi Katharina Krombholz and Mario Fritz. 2020. VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity. 1681-1698. https:\/\/doi.org\/10.1145\/3372297.3417233 10.1145\/3372297.3417233","DOI":"10.1145\/3372297.3417233"},{"key":"#cr-split#-e_1_3_2_1_1_1.2","doi-asserted-by":"crossref","unstructured":"Sahar Abdelnabi Katharina Krombholz and Mario Fritz. 2020. VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity. 1681-1698. https:\/\/doi.org\/10.1145\/3372297.3417233","DOI":"10.1145\/3372297.3417233"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375708.3380315"},{"key":"e_1_3_2_1_3_1","unstructured":"Eint\u00a0Sandi Aung Chaw\u00a0Thet Zan and Hayato Yamana. 2019. A Survey of URL-based Phishing Detection.  Eint\u00a0Sandi Aung Chaw\u00a0Thet Zan and Hayato Yamana. 2019. A Survey of URL-based Phishing Detection."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.1.23"},{"key":"e_1_3_2_1_5_1","volume-title":"Xception: Deep Learning with Depthwise Separable Convolutions. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1800\u20131807","author":"Chollet Fran\u00e7ois","year":"2017","unstructured":"Fran\u00e7ois Chollet . 2017 . Xception: Deep Learning with Depthwise Separable Convolutions. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1800\u20131807 . https:\/\/doi.org\/10.1109\/CVPR.2017.195 10.1109\/CVPR.2017.195 Fran\u00e7ois Chollet. 2017. Xception: Deep Learning with Depthwise Separable Convolutions. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1800\u20131807. https:\/\/doi.org\/10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_1_6_1","volume-title":"MFA Bypass Phish Caught: OAuth2 Grants Access to User Data Without a Password. Retrieved","author":"A.","year":"2022","unstructured":"Cofense. N\/ A. MFA Bypass Phish Caught: OAuth2 Grants Access to User Data Without a Password. Retrieved August 7, 2022 from https:\/\/cofense.com\/mfa-bypass-phish-caught-oauth2-grants-access-user-data-without-password\/ Cofense. N\/A. MFA Bypass Phish Caught: OAuth2 Grants Access to User Data Without a Password. Retrieved August 7, 2022 from https:\/\/cofense.com\/mfa-bypass-phish-caught-oauth2-grants-access-user-data-without-password\/"},{"key":"e_1_3_2_1_7_1","volume-title":"Phishing and Fraud Report. Retrieved","year":"2022","unstructured":"F5. 2020. Phishing and Fraud Report. Retrieved August 7, 2022 from https:\/\/www.f5.com\/labs\/articles\/threat-intelligence\/2020-phishing-and-fraud-report F5. 2020. Phishing and Fraud Report. Retrieved August 7, 2022 from https:\/\/www.f5.com\/labs\/articles\/threat-intelligence\/2020-phishing-and-fraud-report"},{"key":"e_1_3_2_1_8_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 770\u2013778","author":"He Kaiming","year":"2016","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 770\u2013778 . https:\/\/doi.org\/10.1109\/CVPR.2016.90 10.1109\/CVPR.2016.90 Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_9_1","volume-title":"Phishing Detection: Analysis of Visual Similarity Based Approaches. Security and Communication Networks","author":"Jain Ankit\u00a0Kumar","year":"2017","unstructured":"Ankit\u00a0Kumar Jain and B.\u00a0 B. Gupta . 2017 . Phishing Detection: Analysis of Visual Similarity Based Approaches. Security and Communication Networks 2017, 5421046 (2017). https:\/\/doi.org\/10.1155\/2017\/5421046 10.1155\/2017 Ankit\u00a0Kumar Jain and B.\u00a0B. Gupta. 2017. Phishing Detection: Analysis of Visual Similarity Based Approaches. Security and Communication Networks 2017, 5421046 (2017). https:\/\/doi.org\/10.1155\/2017\/5421046"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2018.00012"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984019"},{"key":"e_1_3_2_1_12_1","volume-title":"Image Based Phishing Detection Using Transfer Learning. In 2019 11th International Conference on Knowledge and Smart Technology (KST). 232\u2013237","author":"Phoka Thanathorn","year":"2019","unstructured":"Thanathorn Phoka and Phisetphong Suthaphan . 2019 . Image Based Phishing Detection Using Transfer Learning. In 2019 11th International Conference on Knowledge and Smart Technology (KST). 232\u2013237 . https:\/\/doi.org\/10.1109\/KST.2019.8687615 10.1109\/KST.2019.8687615 Thanathorn Phoka and Phisetphong Suthaphan. 2019. Image Based Phishing Detection Using Transfer Learning. In 2019 11th International Conference on Knowledge and Smart Technology (KST). 232\u2013237. https:\/\/doi.org\/10.1109\/KST.2019.8687615"},{"key":"e_1_3_2_1_13_1","first-page":"00","volume-title":"Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). 1011\u20131014","author":"Rezende Edmar","year":"2017","unstructured":"Edmar Rezende , Guilherme Ruppert , Tiago Carvalho , Fabio Ramos , and Paulo de Geus . 2017 . Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). 1011\u20131014 . https:\/\/doi.org\/10.1109\/ICMLA.2017. 00 - 19 10.1109\/ICMLA.2017.00-19 Edmar Rezende, Guilherme Ruppert, Tiago Carvalho, Fabio Ramos, and Paulo de Geus. 2017. Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). 1011\u20131014. https:\/\/doi.org\/10.1109\/ICMLA.2017.00-19"},{"key":"e_1_3_2_1_14_1","volume-title":"Malicious Software Classification Using VGG16 Deep Neural Network\u2019s Bottleneck Features","author":"Rezende Edmar","year":"2018","unstructured":"Edmar Rezende , Guilherme Ruppert , Tiago Carvalho , Antonio Theophilo , Fabio Ramos , and Paulo De\u00a0Geus . 2018. Malicious Software Classification Using VGG16 Deep Neural Network\u2019s Bottleneck Features . IEEE Access ( 01 2018 ), 51\u201359. https:\/\/doi.org\/10.1007\/978-3-319-77028-4_9 10.1007\/978-3-319-77028-4_9 Edmar Rezende, Guilherme Ruppert, Tiago Carvalho, Antonio Theophilo, Fabio Ramos, and Paulo De\u00a0Geus. 2018. Malicious Software Classification Using VGG16 Deep Neural Network\u2019s Bottleneck Features. IEEE Access (01 2018), 51\u201359. https:\/\/doi.org\/10.1007\/978-3-319-77028-4_9"},{"key":"e_1_3_2_1_15_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv 1409.1556 (09","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv 1409.1556 (09 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv 1409.1556 (09 2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"Fake Banknote Recognition Using Deep Learning. Applied Sciences 11 (01","author":"Suesc\u00fan C\u00e9sar","year":"2021","unstructured":"C\u00e9sar Suesc\u00fan , Dora Ballesteros , and Diego Renza . 2021. Fake Banknote Recognition Using Deep Learning. Applied Sciences 11 (01 2021 ), 1281. https:\/\/doi.org\/10.3390\/app11031281 10.3390\/app11031281 C\u00e9sar Suesc\u00fan, Dora Ballesteros, and Diego Renza. 2021. Fake Banknote Recognition Using Deep Learning. Applied Sciences 11 (01 2021), 1281. https:\/\/doi.org\/10.3390\/app11031281"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_18_1","volume-title":"Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2818\u20132826","author":"Szegedy Christian","year":"2016","unstructured":"Christian Szegedy , Vincent Vanhoucke , Sergey Ioffe , Jon Shlens , and Zbigniew Wojna . 2016 . Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2818\u20132826 . https:\/\/doi.org\/10.1109\/CVPR.2016.308 10.1109\/CVPR.2016.308 Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jon Shlens, and Zbigniew Wojna. 2016. Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2818\u20132826. https:\/\/doi.org\/10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_19_1","volume-title":"Verizon Data Breach Investigations Report. Retrieved","year":"2022","unstructured":"Verizon. 2022. Verizon Data Breach Investigations Report. Retrieved August 7, 2022 from https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/ Verizon. 2022. Verizon Data Breach Investigations Report. Retrieved August 7, 2022 from https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","location":"Hanoi Vietnam","acronym":"SoICT 2022"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:40Z","timestamp":1750186840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":20,"alternative-id":["10.1145\/3568562.3568629","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568629","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}