{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:16:40Z","timestamp":1769635000947,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,18]]},"DOI":"10.1145\/3603287.3651193","type":"proceedings-article","created":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T12:06:34Z","timestamp":1714219594000},"page":"77-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7405-7646","authenticated-orcid":false,"given":"Sultan","family":"Asiri","sequence":"first","affiliation":[{"name":"The University of Alabama, Tuscaloosa, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8549-6794","authenticated-orcid":false,"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"The University of Alabama, Tuscaloosa, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8380-2487","authenticated-orcid":false,"given":"Saleh","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"The University of Alabama, Tuscaloosa, Alabama, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2020. Alexa Dataset. https:\/\/www.alexa.com\/topsites"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3237798"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13010030"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755706"},{"key":"e_1_3_2_1_5_1","volume-title":"14 Phishing Red Flags to Watch for","year":"2022","unstructured":"CyberTalk. 2022. 14 Phishing Red Flags to Watch for in 2022. https:\/\/www.cybertalk.org\/2022\/02\/28\/14-phishing-red-flags-to-watch-for-in-2022\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Phishtank Developer. 2022. Phishtank Dataset. https:\/\/phishtank.org\/developerinfo.phpl"},{"key":"e_1_3_2_1_7_1","unstructured":"Docker Container. 2022. Accelerated Containerized Application Development. https:\/\/www.docker.com\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Phishing Army: The Blocklist to Filter Phishing! https:\/\/www.phishing.army\/","author":"Draghetti Andrea","year":"2022","unstructured":"Andrea Draghetti. 2022. Phishing Army: The Blocklist to Filter Phishing! https:\/\/www.phishing.army\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Federal Bureau of Investigation. 2021. FBI Releases the Internet Crime Complaint Center 2020 Internet Crime Report Including COVID-19 Scam Statistics. https:\/\/www.fbi.gov\/news\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics","DOI":"10.1016\/S1361-3723(21)00038-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043188"},{"key":"e_1_3_2_1_11_1","unstructured":"Sid Ghodke. 2018. Alexa Top 1 Million Sites. https:\/\/www.kaggle.com\/datasets\/cheedcheed\/top1m"},{"key":"e_1_3_2_1_12_1","volume-title":"Knowledge Discovery in Databases: PKDD","author":"Godbole Shantanu","year":"2004","unstructured":"Shantanu Godbole, Abhay Harpale, Sunita Sarawagi, and Soumen Chakrabarti. 2004. Document Classification Through Interactive Supervision of Document and Term Labels. In Knowledge Discovery in Databases: PKDD 2004, Jean-Fran\u00e7ois Boulicaut, Floriana Esposito, Fosca Giannotti, and Dino Pedreschi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 185--196."},{"key":"e_1_3_2_1_13_1","unstructured":"Google Chrome Developers. 2022. Chrome Extensions. https:\/\/developer.chrome.com\/docs\/extensions"},{"key":"e_1_3_2_1_14_1","unstructured":"Google gVisor. 2022. What is gVisor? https:\/\/gvisor.dev\/docs\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0414-0"},{"key":"e_1_3_2_1_16_1","unstructured":"Armand Joulin Edouard Grave Piotr Bojanowski Matthijs Douze H\u00e9rve J\u00e9gou and Tomas Mikolov. 2016. Fasttext. zip: Compressing Text Classification Models. arXiv:1612.03651 [cs.CL]"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP): System Demonstrations","author":"Karmakharm Twin","year":"2019","unstructured":"Twin Karmakharm, Nikolaos Aletras, and Kalina Bontcheva. 2019. Journalist-in-the-loop: Continuous Learning as a Service for Rumour Analysis. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP): System Demonstrations. Hong Kong, China, 115--120."},{"key":"e_1_3_2_1_18_1","volume-title":"URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection. arXiv preprint arXiv:1802.03162","author":"Le Hung","year":"2018","unstructured":"Hung Le, Quang Pham, Doyen Sahoo, and Steven CH Hoi. 2018. URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection. arXiv preprint arXiv:1802.03162 (2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"Dialogue Learning with Human-in-the-loop. arXiv preprint arXiv:1611.09823","author":"Li Jiwei","year":"2016","unstructured":"Jiwei Li, Alexander H Miller, Sumit Chopra, Marc'Aurelio Ranzato, and Jason Weston. 2016. Dialogue Learning with Human-in-the-loop. arXiv preprint arXiv:1611.09823 (2016)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2743528"},{"key":"e_1_3_2_1_21_1","unstructured":"mrd0x Developers. 2021. Browser In The Browser (BITB) Attack. https:\/\/mrd0x.com\/browser-in-the-browser-phishing-attack\/"},{"key":"e_1_3_2_1_22_1","unstructured":"OpenPhish Developer. 2020. OpenPhish Dataset. https:\/\/openphish.com"},{"key":"e_1_3_2_1_23_1","unstructured":"Koceilah Rekouche. 2011. Early Phishing. arXiv:1106.4692"},{"key":"e_1_3_2_1_24_1","volume-title":"SVM and Neural Network with Backpropagation. In 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE). IEEE","author":"Sindhu Smita","year":"2020","unstructured":"Smita Sindhu, Sunil Patil Parameshwar, Arya Sreevalsan, Faiz Rahman, and Ms Saritha AN. 2020. Phishing Detection Using Random Forest, SVM and Neural Network with Backpropagation. In 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE). IEEE, Bengaluru, India, 391--394."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053670"},{"key":"e_1_3_2_1_26_1","volume-title":"\u0141 ukasz Kaiser, and Illia Polosukhin","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141 ukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems, I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc., Long Beach, CA, USA."},{"key":"e_1_3_2_1_27_1","unstructured":"Gavin Wright and Madelyn Bacon. 2021. What is a Watering Hole Attack? https:\/\/www.techtarget.com\/searchsecurity\/definition\/watering-hole-attack"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049625"},{"key":"e_1_3_2_1_29_1","volume-title":"Fine-tuning Language Models from Human Preferences. arXiv preprint arXiv:1909.08593","author":"Ziegler Daniel M","year":"2019","unstructured":"Daniel M Ziegler, Nisan Stiennon, Jeffrey Wu, Tom B Brown, Alec Radford, Dario Amodei, Paul Christiano, and Geoffrey Irving. 2019. Fine-tuning Language Models from Human Preferences. arXiv preprint arXiv:1909.08593 (2019)."}],"event":{"name":"ACM SE '24: 2024 ACM Southeast Conference","location":"Marietta GA USA","acronym":"ACM SE '24","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2024 ACM Southeast Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651193","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603287.3651193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:06:33Z","timestamp":1756487193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":29,"alternative-id":["10.1145\/3603287.3651193","10.1145\/3603287"],"URL":"https:\/\/doi.org\/10.1145\/3603287.3651193","relation":{},"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"2024-04-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}