{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:57:18Z","timestamp":1776085038566,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,7]]},"DOI":"10.1145\/3628797.3629003","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T15:25:34Z","timestamp":1701876334000},"page":"793-800","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Shark-Eyes: A multimodal fusion framework for multi-view-based phishing website detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9428-0214","authenticated-orcid":false,"given":"Minh","family":"Vo Quang","sequence":"first","affiliation":[{"name":"University of Information Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3218-0672","authenticated-orcid":false,"given":"Dang","family":"Bui Tan Hai","sequence":"additional","affiliation":[{"name":"University of Information Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5820-8988","authenticated-orcid":false,"given":"Ngan","family":"Tran Kim Ngoc","sequence":"additional","affiliation":[{"name":"University of Information Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8101-7311","authenticated-orcid":false,"given":"Son","family":"Ngo Duc Hoang","sequence":"additional","affiliation":[{"name":"University of Information Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0065-9919","authenticated-orcid":false,"given":"Quyen","family":"Nguyen Huu","sequence":"additional","affiliation":[{"name":"University of Information Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5945-3712","authenticated-orcid":false,"given":"Duy","family":"Phan The","sequence":"additional","affiliation":[{"name":"University of Information Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3147-3356","authenticated-orcid":false,"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Information Technology, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3166474"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23094403"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010232"},{"key":"e_1_3_2_1_4_1","unstructured":"Iraj\u00a0Sadegh Amiri Oluwatobi\u00a0Ayodeji Akanbi and Elahe Fazeldehkordi. 2014. A machine-learning approach to phishing detection and defense. Syngress."},{"key":"e_1_3_2_1_5_1","volume-title":"Multimodal machine learning: A survey and taxonomy","author":"Baltru\u0161aitis Tadas","year":"2018","unstructured":"Tadas Baltru\u0161aitis, Chaitanya Ahuja, and Louis-Philippe Morency. 2018. Multimodal machine learning: A survey and taxonomy. IEEE transactions on pattern analysis and machine intelligence 41, 2 (2018), 423\u2013443."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043188"},{"key":"e_1_3_2_1_8_1","volume-title":"Phishing Attack Trends Report \u2013 4Q","author":"Anti-Phishing\u00a0Working Group","year":"2022","unstructured":"Anti-Phishing\u00a0Working Group. 2023. Phishing Attack Trends Report \u2013 4Q 2022. https:\/\/apwg.org\/trendsreports\/ [accessed 15-July-2023]."},{"key":"e_1_3_2_1_9_1","volume-title":"Phishing url detection with lexical features and blacklisted domains. Adaptive autonomous secure cyber systems","author":"Hong Jiwon","year":"2020","unstructured":"Jiwon Hong, Taeri Kim, Jing Liu, Noseong Park, and Sang-Wook Kim. 2020. Phishing url detection with lexical features and blacklisted domains. Adaptive autonomous secure cyber systems (2020), 253\u2013267."},{"key":"e_1_3_2_1_10_1","volume-title":"Phishing detection: analysis of visual similarity based approaches. Security and Communication Networks 2017","author":"Jain Ankit\u00a0Kumar","year":"2017","unstructured":"Ankit\u00a0Kumar Jain, Brij\u00a0B Gupta, 2017. Phishing detection: analysis of visual similarity based approaches. Security and Communication Networks 2017 (2017)."},{"key":"e_1_3_2_1_11_1","volume-title":"Shams Ul\u00a0Arfeen Laghari, and Yung-Wey Chong","author":"Li Wenhao","year":"2023","unstructured":"Wenhao Li, Selvakumar Manickam, Shams Ul\u00a0Arfeen Laghari, and Yung-Wey Chong. 2023. Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites. IEEE Access (2023)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927075"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12106"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2020.0078"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892066"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049625"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247135"}],"event":{"name":"SOICT 2023: The 12th International Symposium on Information and Communication Technology","location":"Ho Chi Minh Vietnam","acronym":"SOICT 2023"},"container-title":["Proceedings of the 12th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3629003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628797.3629003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:24:16Z","timestamp":1755779056000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3629003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":17,"alternative-id":["10.1145\/3628797.3629003","10.1145\/3628797"],"URL":"https:\/\/doi.org\/10.1145\/3628797.3629003","relation":{},"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"2023-12-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}