{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:46:51Z","timestamp":1771613211982,"version":"3.50.1"},"reference-count":79,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T00:00:00Z","timestamp":1537920000000},"content-version":"vor","delay-in-days":268,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571290"],"award-info":[{"award-number":["61571290"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61831007"],"award-info":[{"award-number":["61831007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61431008"],"award-info":[{"award-number":["61431008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1652669"],"award-info":[{"award-number":["1652669"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1539047"],"award-info":[{"award-number":["1539047"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Web service is one of the key communications software services for the Internet. Web phishing is one of many security threats to web services on the Internet. Web phishing aims to steal private information, such as usernames, passwords, and credit card details, by way of impersonating a legitimate entity. It will lead to information disclosure and property damage. This paper mainly focuses on applying a deep learning framework to detect phishing websites. This paper first designs two types of features for web phishing: original features and interaction features. A detection model based on Deep Belief Networks (DBN) is then presented. The test using real IP flows from ISP (Internet Service Provider) shows that the detecting model based on DBN can achieve an approximately 90% true positive rate and 0.6% false positive rate.<\/jats:p>","DOI":"10.1155\/2018\/4678746","type":"journal-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T19:37:01Z","timestamp":1537990621000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":95,"title":["Web Phishing Detection Using a Deep Learning Framework"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4530-5118","authenticated-orcid":false,"given":"Ping","family":"Yi","sequence":"first","affiliation":[]},{"given":"Yuxiang","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Futai","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3307-050X","authenticated-orcid":false,"given":"Ting","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"e_1_2_9_1_2","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Web_service."},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2639009"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2637878"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.183"},{"key":"e_1_2_9_5_2","unstructured":"https:\/\/en.wikipedia.org\/wiki\/WeChat."},{"key":"e_1_2_9_6_2","volume-title":"Early phishing","author":"Rekouche K.","year":"2011"},{"key":"e_1_2_9_7_2","unstructured":"http:\/\/www.antiphishing.org\/."},{"key":"e_1_2_9_8_2","article-title":"20% Indians are victims of online phishing attacks: Microsoft","author":"Microsoft","year":"2014","journal-title":"IANS"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2472993"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"PrakashP. KumarM. KompellaR. R. andGuptaM. PhishNet: Predictive blacklisting to detect phishing attacks Proceedings of the 2017 IEEE Conference on Computer Communications (IEEE INFOCOM 2010) March 2010 San Diego USA.","DOI":"10.1109\/INFCOM.2010.5462216"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2377295"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.04.015"},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"YiP. ZhuT. ZhangQ. WuY. andLiJ. A denial of service attack in advanced metering infrastructure network Proceedings of the 2014 IEEE International Conference on Communications (IEEE ICC 2014) June 2014 Sydney Australia IEEE 1029\u20131034 https:\/\/doi.org\/10.1109\/ICC.2014.6883456.","DOI":"10.1109\/ICC.2014.6883456"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"XiaoS. GongW. TowsleyD. ZhangQ. andZhuT. Reliability analysis for cryptographic key management Proceedings of the IEEE International Conference on Communications (IEEE ICC 2014) June 2014 Sydney Austrailia https:\/\/doi.org\/10.1109\/ICC.2014.6883450.","DOI":"10.1109\/ICC.2014.6883450"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3402-6"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"HuangZ. ZhuT. GuY. andLiY. Shepherd: Sharing energy for privacy preserving in hybrid AC-DC microgrids Proceedings of the Seventh ACM International Conference on Future Energy Systems (ACM e-Energy 2016) 2016 Canada.","DOI":"10.1145\/2934328.2934347"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"LiY.andZhuT. Gait-Based Wi-Fi signatures for privacy-preserving Proceedings of the 2016 ACM Symposium on InformAtion Computer and Communications Security (ASIACCS 2016) 2016 Xi\u2032an China https:\/\/doi.org\/10.1145\/2897845.2897909.","DOI":"10.1145\/2897845.2897909"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"YaoY. LiY. LiuX. ChiZ. WangW. XieT. andZhuT. Aegis: An interference-negligible RF sensing shield Proceedings of the 37th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2018) April 2018 Honolulu HI Hawaii USA.","DOI":"10.1109\/INFOCOM.2018.8485883"},{"key":"e_1_2_9_19_2","doi-asserted-by":"crossref","unstructured":"ZhuT. XiaoS. YiP. TowsleyD. andGongW. A secure energy routing mechanism for sharing renewable energy in smart microgrid Proceedings of the 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm 2011) 2011 Brussels Belgium.","DOI":"10.1109\/SmartGridComm.2011.6102307"},{"key":"e_1_2_9_20_2","doi-asserted-by":"crossref","unstructured":"ZhuT.andYuM. A secure quality of service routing protocol for wireless Ad Hoc Networks Proceedings of the IEEE Global Communication Conference (IEEE GLOBECOM 2006) November 2006 San Francisco CA USA.","DOI":"10.1109\/GLOCOM.2006.270"},{"key":"e_1_2_9_21_2","doi-asserted-by":"crossref","unstructured":"ZhuT.andYuM. A dynamic secure QoS routing protocol for wireless Ad Hoc networks Proceedings of the 29th IEEE Sarnoff Symposium (IEEE Sarnoff \u201906) April 2006 Princeton NJ USA.","DOI":"10.1109\/SARNOF.2006.4534795"},{"key":"e_1_2_9_22_2","first-page":"269","article-title":"An intrusion prevention mechanism in mobile ad hoc networks","volume":"17","author":"Yi P.","year":"2013","journal-title":"Ad-Hoc & Sensor Wireless Networks"},{"key":"e_1_2_9_23_2","first-page":"4101","article-title":"Cross-layer detection for black hole attack in wireless network","volume":"8","author":"Yi P.","year":"2012","journal-title":"Journal of Computational Information Systems"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/240217"},{"key":"e_1_2_9_25_2","first-page":"107","article-title":"Towards an artificial immune system for detecting anomalies in wireless mesh networks","volume":"8","author":"Yi P.","year":"2011","journal-title":"China Communications"},{"key":"e_1_2_9_26_2","first-page":"40","article-title":"Intrusion detection for wireless mesh networks using finite state Machine","volume":"7","author":"Yi P.","year":"2010","journal-title":"China Communications"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1004-4132(08)60163-2"},{"key":"e_1_2_9_28_2","doi-asserted-by":"crossref","unstructured":"YiP. ZhuT. ZhangQ. WuY. andLiJ. Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM 2012) December 2012 Anaheim California USA https:\/\/doi.org\/10.1109\/GLOCOM.2012.6503580 2-s2.0-84877639290.","DOI":"10.1109\/GLOCOM.2012.6503580"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2011.2167354"},{"key":"e_1_2_9_30_2","doi-asserted-by":"crossref","unstructured":"ZhouC.andZhuT. Highly spatial reusable MAC for wireless sensor networks Proceedings of the 2007 International Conference on Wireless Communications Networking and Mobile Computing WiCOM 2007 September 2007 China IEEE 2-s2.0-38049032848.","DOI":"10.1109\/WICOM.2007.590"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460447"},{"key":"e_1_2_9_32_2","doi-asserted-by":"crossref","unstructured":"ChangZ.andTingZ. Thorough analysis of MAC protocols in wireless sensor networks Proceedings of the 2008 4th International Conference on Wireless Communications Networking and Mobile Computing October 2008 China IEEE 2-s2.0-58049109678.","DOI":"10.1109\/WiCom.2008.887"},{"key":"e_1_2_9_33_2","unstructured":"ZhouC.andZhuT. A spatial reusable MAC protocol for stable wireless sensor networks Proceedings of the 2008 International Conference on Wireless Communications Networking and Mobile Computing WiCOM 2008 October 2008 China 2-s2.0-58049128769."},{"key":"e_1_2_9_34_2","doi-asserted-by":"crossref","unstructured":"GuY. ZhuT. andHeT. ESC: energy synchronized communication in sustainable sensor networks Proceedings of the 17th IEEE International Conference on Network Protocols (ICNP \u203209) October 2009 Princeton NJ USA https:\/\/doi.org\/10.1109\/icnp.2009.5339699 2-s2.0-71949084440.","DOI":"10.1109\/ICNP.2009.5339699"},{"key":"e_1_2_9_35_2","doi-asserted-by":"crossref","unstructured":"ZhongZ. ZhuT. WangD. andHeT. Tracking with unreliable node sequences Proceedings of the 28th Conference on Computer Communications (INFOCOM \u203209) April 2009 https:\/\/doi.org\/10.1109\/infcom.2009.5062035 2-s2.0-70349696146.","DOI":"10.1109\/INFCOM.2009.5062035"},{"key":"e_1_2_9_36_2","doi-asserted-by":"crossref","unstructured":"ZhuT. ZhongZ. GuY. HeT. andZhangZ.-L. Leakage-aware energy synchronization for wireless sensor networks Proceedings of the 7th ACM International Conference on Mobile Systems Applications and Services (MobiSys\u203209) June 2009 Poland 2-s2.0-70450239995.","DOI":"10.1145\/1555816.1555849"},{"key":"e_1_2_9_37_2","doi-asserted-by":"crossref","unstructured":"ZhuT. GuY. HeT. andZhangZ.-L. EShare: a capacitor-driven energy storage and sharing network for long-term operation Proceedings of the 8th ACM International Conference on Embedded Networked Sensor Systems (SenSys \u203210) November 2010 Z\u00fcrich Switzerland 239\u2013252 https:\/\/doi.org\/10.1145\/1869983.1870007 2-s2.0-78650941802.","DOI":"10.1145\/1869983.1870007"},{"key":"e_1_2_9_38_2","doi-asserted-by":"crossref","unstructured":"ZhuT.andTowsleyD. E2R: Energy efficient routing for multi-hop green wireless networks Proceedings of the 2011 IEEE Conference on Computer Communications Workshops INFOCOM WKSHPS 2011 April 2011 China 2-s2.0-79960599596.","DOI":"10.1109\/INFCOMW.2011.5928821"},{"key":"e_1_2_9_39_2","doi-asserted-by":"crossref","unstructured":"GuoS. KimS. M. ZhuT. GuY. andHeT. Correlated flooding in low-duty-cycle wireless sensor networks Proceedings of the 19th IEEE International Conference on Network Protocols (ICNP \u203211) October 2011 Vancouver BC Canada IEEE https:\/\/doi.org\/10.1109\/icnp.2011.6089078 2-s2.0-84055200888.","DOI":"10.1109\/ICNP.2011.6089078"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2240116.2240121"},{"key":"e_1_2_9_41_2","doi-asserted-by":"crossref","unstructured":"ZhangQ. ZhuT. PingY. andGuY. Cooperative data reduction in wireless sensor network Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM \u203212) December 2012 Anaheim CA USA IEEE https:\/\/doi.org\/10.1109\/GLOCOM.2012.6503183.","DOI":"10.1109\/GLOCOM.2012.6503183"},{"key":"e_1_2_9_42_2","doi-asserted-by":"crossref","unstructured":"ZhuT. MohaisenA. PingY. andTowsleyD. DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks Proceedings of the IEEE Conference on Computer Communications (INFOCOM \u203212) March 2012 Orlando Fla USA https:\/\/doi.org\/10.1109\/INFCOM.2012.6195625 2-s2.0-84861617314.","DOI":"10.1109\/INFCOM.2012.6195625"},{"key":"e_1_2_9_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2197689"},{"key":"e_1_2_9_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2544375.2544388"},{"key":"e_1_2_9_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2368557"},{"key":"e_1_2_9_46_2","doi-asserted-by":"crossref","unstructured":"RenS. YiP. HongD. WuY. andZhuT. Distributed construction of connected dominating sets optimized by minimum-weight spanning tree in wireless Ad-Hoc sensor networks Proceedings of the 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE) December 2014 Chengdu China IEEE https:\/\/doi.org\/10.1109\/CSE.2014.183.","DOI":"10.1109\/CSE.2014.183"},{"key":"e_1_2_9_47_2","doi-asserted-by":"crossref","unstructured":"RenS. YiP. ZhuT. WuY. andLiJ. A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks Proceedings of the 2014 IEEE\/CIC International Conference on Communications in China ICCC 2014 October 2014 China 829\u2013834 2-s2.0-84922569127.","DOI":"10.1109\/ICCChina.2014.7008391"},{"key":"e_1_2_9_48_2","doi-asserted-by":"crossref","unstructured":"ZhouZ. XieM. ZhuT. XuW. YiP. HuangZ. ZhangQ. andXiaoS. EEP2P: An energy-efficient and economy-efficient P2P network protocol Proceedings of the 2014 International Green Computing Conference IGCC 2014 November 2014 Dallas TX USA IEEE 2-s2.0-84924388066.","DOI":"10.1109\/IGCC.2014.7039171"},{"key":"e_1_2_9_49_2","doi-asserted-by":"crossref","unstructured":"HeL. ChengP. GuY. PanJ. ZhuT. andLiuC. Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks Proceedings of the 33rd IEEE Conference on Computer Communications IEEE INFOCOM 2014 May 2014 Canada 1195\u20131203 2-s2.0-84904415311.","DOI":"10.1109\/INFOCOM.2014.6848051"},{"key":"e_1_2_9_50_2","doi-asserted-by":"crossref","unstructured":"JunJ. ChengL. HeL. GuY. andZhuT. Exploiting sender-based link correlation in wireless sensor networks Proceedings of the 22nd IEEE International Conference on Network Protocols ICNP 2014 October 2014 USA 445\u2013455 2-s2.0-84920054609.","DOI":"10.1109\/ICNP.2014.67"},{"key":"e_1_2_9_51_2","doi-asserted-by":"crossref","unstructured":"HuangZ. CorriganD. NarayananS. ZhuT. BentleyE. andMedleyM. Distributed and dynamic spectrum management in airborne networks Proceedings of the 34th Annual IEEE Military Communications Conference MILCOM 2015 October 2015 USA 786\u2013791 2-s2.0-84959274836.","DOI":"10.1109\/MILCOM.2015.7357540"},{"key":"e_1_2_9_52_2","doi-asserted-by":"crossref","unstructured":"ZhangQ. ZhouZ. XuW. QiJ. GuoC. YiP. ZhuT. andXiaoS. Fingerprint-free tracking with dynamic enhanced field division Proceedings of the 34th IEEE Annual Conference on Computer Communications and Networks IEEE INFOCOM 2015 May 2015 Kowloon Hong Kong 2785\u20132793 https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218671 2-s2.0-84954216016.","DOI":"10.1109\/INFOCOM.2015.7218671"},{"key":"e_1_2_9_53_2","doi-asserted-by":"crossref","unstructured":"ChaiF. ZhuT. andKangK.-D. A link-correlation-aware cross-layer protocol for IoT devices Proceedings of the 2016 IEEE International Conference on Communications ICC 2016 May 2016 Malaysia 2-s2.0-84981336704.","DOI":"10.1109\/ICC.2016.7510940"},{"key":"e_1_2_9_54_2","doi-asserted-by":"crossref","unstructured":"LiY.andZhuT. Using Wi-Fi signals to characterize human gait for identification and activity monitoring Proceedings of the 2016 IEEE First International Conference on Connected Health: Applications Systems and Engineering Technologies (CHASE) June 2016 Washington DC USA 238\u2013247 https:\/\/doi.org\/10.1109\/CHASE.2016.20.","DOI":"10.1109\/CHASE.2016.20"},{"key":"e_1_2_9_55_2","doi-asserted-by":"crossref","unstructured":"ChengL. GuY. NiuJ. ZhuT. LiuC. ZhangQ. andHelT. Taming collisions for delay reduction in low-duty-cycle wireless sensor networks Proceedings of the 35th Annual IEEE International Conference on Computer Communications IEEE INFOCOM 2016 April 2016 USA 2-s2.0-84983343713.","DOI":"10.1109\/INFOCOM.2016.7524538"},{"key":"e_1_2_9_56_2","unstructured":"ChiZ. YaoY. XieT. HuangZ. HammondM. andZhuT. Harmony: Exploiting coarse-grained received signal strength from IoT devices for human activity recognition Proceedings of the 24th IEEE International Conference on Network Protocols ICNP 2016 November 2016 Singapore 2-s2.0-85009433909."},{"key":"e_1_2_9_57_2","doi-asserted-by":"crossref","unstructured":"ChiZ. LiY. SunH. YaoY. LuZ. andZhuT. B2W2: N-way concurrent communication for IoT devices Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems 2016 Stanford CA USA 245\u2013258 https:\/\/doi.org\/10.1145\/2994551.2994561.","DOI":"10.1145\/2994551.2994561"},{"key":"e_1_2_9_58_2","doi-asserted-by":"crossref","unstructured":"ChiZ. LiY. YaoY. andZhuT. PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel Proceedings of the 25th IEEE International Conference on Network Protocols ICNP 2017 October 2017 Canada 2-s2.0-85041405340.","DOI":"10.1109\/ICNP.2017.8117550"},{"key":"e_1_2_9_59_2","doi-asserted-by":"crossref","unstructured":"ChiZ. HuangZ. YaoY. XieT. SunH. andZhuT. EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices Proceedings of the 2017 IEEE Conference on Computer Communications INFOCOM 2017 May 2017 USA 2-s2.0-85034114152.","DOI":"10.1109\/INFOCOM.2017.8057109"},{"key":"e_1_2_9_60_2","doi-asserted-by":"crossref","unstructured":"LiY. ChiZ. LiuX. andZhuT. Chiron: Concurrent high throughput communication for iot devices Proceedings of the 16th Annual International Conference on Mobile Systems Applications and Services (MobiSys \u201918) June 2018 New York NY USA ACM 204\u2013216 https:\/\/doi.org\/10.1145\/3210240.3210346.","DOI":"10.1145\/3210240.3210346"},{"key":"e_1_2_9_61_2","doi-asserted-by":"crossref","unstructured":"YiP. ZhuT. JiangB. WangB. andTowsleyD. An energy transmission and distribution network using electric vehicles Proceedings of the 2012 IEEE International Conference on Communications (ICC \u203212) June 2012 Ottawa ON Canada https:\/\/doi.org\/10.1109\/ICC.2012.6364483.","DOI":"10.1109\/ICC.2012.6364483"},{"key":"e_1_2_9_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130711"},{"key":"e_1_2_9_63_2","doi-asserted-by":"crossref","unstructured":"YiP. ZhuT. LinG. JiangX. LiG. SiL. andBegovicM. M. Energy scheduling and allocation in electric vehicle energy distribution networks Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference ISGT 2013 February 2013 USA 2-s2.0-84876950407.","DOI":"10.1109\/ISGT.2013.6497886"},{"key":"e_1_2_9_64_2","unstructured":"ZhuT. HuangZ. SharmaA. SuJ. IrwinD. MishraA. MenascheD. andShenoyP. Sharing renewable energy in smart microgrids Proceedings of the 2013 ACM\/IEEE International Conference on Cyber-Physical Systems ICCPS 2013 April 2013 USA 2-s2.0-84885206219."},{"key":"e_1_2_9_65_2","unstructured":"https:\/\/www.mozilla.org\/en-US\/."},{"key":"e_1_2_9_66_2","unstructured":"https:\/\/www.google.com\/chrome\/browser\/index.html."},{"key":"e_1_2_9_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.50"},{"key":"e_1_2_9_68_2","doi-asserted-by":"crossref","unstructured":"ChuW. ZhuB. B. XueF. GuanX. andCaiZ. Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs Proceedings of the 2013 IEEE International Conference on Communications (IEEE ICC 2013) 2013 Budapest Hungary 2-s2.0-84891361073.","DOI":"10.1109\/ICC.2013.6654816"},{"key":"e_1_2_9_69_2","doi-asserted-by":"crossref","unstructured":"MaJ. SaulL. K. SavageS. andVoelkerG. M. Beyond blacklists: learning to detect malicious web sites from suspicious URLs Proceedings of the 15th International Conference on Knowledge Discovery and Data Mining (ACM KDD09) 2009 Paris France https:\/\/doi.org\/10.1145\/1557019.1557153 2-s2.0-70350630557.","DOI":"10.1145\/1557019.1557153"},{"key":"e_1_2_9_70_2","unstructured":"http:\/\/www.scholarpedia.org\/article\/Deep_belief_networks."},{"key":"e_1_2_9_71_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"e_1_2_9_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1984.4767596"},{"key":"e_1_2_9_73_2","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"e_1_2_9_74_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.7761831"},{"key":"e_1_2_9_75_2","volume-title":"Deep Learning Using Support Vector Machines","author":"Tang Y.","year":"2013"},{"key":"e_1_2_9_76_2","volume-title":"A survey: Time Travel in Deep Learning Space: An Introduction to Deep Learning Models And How Deep Learning Models Evolved from The Initial Ideas","author":"Wang H.","year":"2015"},{"key":"e_1_2_9_77_2","volume-title":"Comparative Study of Deep Learning Software Frameworks","author":"Bahrampour S.","year":"2015"},{"key":"e_1_2_9_78_2","unstructured":"http:\/\/sourceforge.net\/projects\/gpumlib."},{"key":"e_1_2_9_79_2","volume-title":"CS224n","author":"McAfee L.","year":"2008"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4678746.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4678746.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/4678746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T16:07:44Z","timestamp":1755706064000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/4678746"}},"subtitle":[],"editor":[{"given":"Tony T.","family":"Luo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":79,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/4678746"],"URL":"https:\/\/doi.org\/10.1155\/2018\/4678746","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-06-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4678746"}}