{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:21:25Z","timestamp":1769923285908,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272465, 62002361, 62272464 and U1836209"],"award-info":[{"award-number":["62272465, 62002361, 62272464 and U1836209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities and Research Funds of Renmin University of China","award":["22XNKJ29"],"award-info":[{"award-number":["22XNKJ29"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623199","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"2486-2500","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7414-6464","authenticated-orcid":false,"given":"Changqing","family":"Miao","sequence":"first","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6701-2730","authenticated-orcid":false,"given":"Jianan","family":"Feng","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1009-6627","authenticated-orcid":false,"given":"Wei","family":"You","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5160-1223","authenticated-orcid":false,"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4403-0060","authenticated-orcid":false,"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4818-7164","authenticated-orcid":false,"given":"Bin","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. GUROBI OPTIMIZATION. https:\/\/www.gurobi.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Module: tf.lite. https:\/\/www.tensorflow.org\/api_docs\/python\/tf\/lite."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417233"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2204.00985"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA47702.2019.8982427"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168235"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375708.3380315"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769571"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996767"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567980"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Giovanni Apruzzese and V. S. Subrahmanian. 2022. Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. CoRR Vol. abs\/2212.05380 (2022). https:\/\/doi.org\/10.48550\/arXiv.2212.05380 showeprint[arXiv]2212.05380","DOI":"10.48550\/arXiv.2212.05380"},{"key":"e_1_3_2_1_12_1","unstructured":"APWG. 2022. Phishing Activity Trends Report 3rd Quarter 2022. Technical Report. https:\/\/apwg.org\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLANT53170.2021.9690540"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945048"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506278"},{"key":"e_1_3_2_1_16_1","volume-title":"abs\/1712.09665","author":"Brown Tom B.","year":"2017","unstructured":"Tom B. Brown, Dandelion Man\u00e9, Aurko Roy, Mart\u00edn Abadi, and Justin Gilmer. 2017. Adversarial Patch. CoRR, Vol. abs\/1712.09665 (2017). http:\/\/arxiv.org\/abs\/1712.09665"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754394"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.07.006"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101826.1101866"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223647"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395602"},{"key":"e_1_3_2_1_24_1","volume-title":"3rd International Conference on Learning Representations, ICLR","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_2_1_25_1","unstructured":"Google. 2023. Safe-browsing in Chrome. https:\/\/transparencyreport.google.com\/safe-browsing\/overview"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00039"},{"key":"e_1_3_2_1_27_1","volume-title":"Darling","author":"Gressel Gilad","year":"2021","unstructured":"Gilad Gressel, Niranjan Hegde, Archana Sreekumar, and Michael C. Darling. 2021. Feature Importance Guided Attack: A Model Agnostic Adversarial Attack. CoRR, Vol. abs\/2106.14815 (2021). [arXiv]2106.14815 https:\/\/arxiv.org\/abs\/2106.14815"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27901-0_15"},{"key":"e_1_3_2_1_30_1","volume-title":"Cyber Security: Proceedings of CSI","author":"Jain Ankit Kumar","year":"2018","unstructured":"Ankit Kumar Jain and BB Gupta. 2018. PHISH-SAFE: URL features-based phishing detection system using machine learning. In Cyber Security: Proceedings of CSI 2015. Springer, 467--474."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00257"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","volume":"2520","author":"Karmon Danny","year":"2018","unstructured":"Danny Karmon, Daniel Zoran, and Yoav Goldberg. 2018. LaVAN: Localized and Visible Adversarial Noise. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden (Proceedings of Machine Learning Research, Vol. 80). PMLR, 2512--2520. http:\/\/proceedings.mlr.press\/v80\/karmon18a.html"},{"key":"e_1_3_2_1_33_1","volume-title":"5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum\"id=HJGU3Rodl","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017a. Adversarial examples in the physical world. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum\"id=HJGU3Rodl"},{"key":"e_1_3_2_1_34_1","volume-title":"5th International Conference on Learning Representations, ICLR 2017, Toulon, France, Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=BJm4T4Kgx","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017b. Adversarial Machine Learning at Scale. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=BJm4T4Kgx"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883060"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460905"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_39_1","unstructured":"OpenPhish. 2023. OpenPhish - Phishing Intelligence. https:\/\/openphish.com\/"},{"key":"e_1_3_2_1_40_1","volume-title":"Towards Adversarial Phishing Detection. In 13th USENIX Workshop on Cyber Security Experimentation and Test, CSET","author":"Panum Thomas Kobber","year":"2020","unstructured":"Thomas Kobber Panum, Kaspar Hageman, Ren\u00e9 Rydhof Hansen, and Jens Myrup Pedersen. 2020. Towards Adversarial Phishing Detection. In 13th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2020. USENIX Association. https:\/\/www.usenix.org\/conference\/cset20\/presentation\/panum"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.58"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67777-4_27"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_45_1","volume-title":"Computer Vision-ECCV 2014: 13th European Conference","author":"Shen Chengyao","unstructured":"Chengyao Shen and Qi Zhao. 2014. Webpage saliency. In Computer Vision-ECCV 2014: 13th European Conference, Zurich, Switzerland, Proceedings, Part VII 13. Springer, 33--46."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_5"},{"key":"e_1_3_2_1_47_1","volume-title":"MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses. CoRR","author":"Sidi Lior","year":"2019","unstructured":"Lior Sidi, Asaf Nadler, and Asaf Shabtai. 2019. MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses. CoRR, Vol. abs\/1902.08909 (2019). [arXiv]1902.08909 http:\/\/arxiv.org\/abs\/1902.08909"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-020-01392-4"},{"key":"e_1_3_2_1_49_1","volume-title":"Constructing Unrestricted Adversarial Examples with Generative Models. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018","author":"Song Yang","year":"2018","unstructured":"Yang Song, Rui Shu, Nate Kushman, and Stefano Ermon. 2018. Constructing Unrestricted Adversarial Examples with Generative Models. In Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, Montr\u00e9 al, Canada. 8322--8333. https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/8cea559c47e4fbdb73b23e0223d04e79-Abstract.html"},{"key":"e_1_3_2_1_50_1","volume-title":"Riedmiller","author":"Springenberg Jost Tobias","year":"2015","unstructured":"Jost Tobias Springenberg, Alexey Dosovitskiy, Thomas Brox, and Martin A. Riedmiller. 2015. Striving for Simplicity: The All Convolutional Net. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Workshop Track Proceedings. http:\/\/arxiv.org\/abs\/1412.6806"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_52_1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1312","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"e_1_3_2_1_53_1","unstructured":"Cisco Talos Intelligence Group (Talos). 2023. PhishTank | Join the fight against phishing. https:\/\/phishtank.org\/"},{"key":"e_1_3_2_1_54_1","volume-title":"McDaniel","author":"Tram\u00e8r Florian","year":"2018","unstructured":"Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, and Patrick D. McDaniel. 2018. Ensemble Adversarial Training: Attacks and Defenses. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=rkZvSe-RZ"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19194258"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2010","author":"Whittaker Colin","year":"2010","unstructured":"Colin Whittaker, Brian Ryner, and Marria Nazif. 2010. Large-Scale Automatic Classification of Phishing Pages. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2010\/large-scale-automatic-classification-phishing-pages"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.02.013"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58574-7_41"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"},{"key":"e_1_3_2_1_61_1","volume-title":"Alzaylaee","author":"Yerima Suleiman Y.","year":"2020","unstructured":"Suleiman Y. Yerima and Mohammed K. Alzaylaee. 2020. High Accuracy Phishing Detection Based on Convolutional Neural Networks. CoRR, Vol. abs\/2004.03960 (2020). https:\/\/arxiv.org\/abs\/2004.03960"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4678746"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33012253"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623199","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:44:22Z","timestamp":1755740662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":63,"alternative-id":["10.1145\/3576915.3623199","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623199","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}