{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T09:10:22Z","timestamp":1743239422853,"version":"3.40.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T00:00:00Z","timestamp":1739664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T00:00:00Z","timestamp":1739664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,16]]},"DOI":"10.23919\/icact63878.2025.10936701","type":"proceedings-article","created":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:07:30Z","timestamp":1743217650000},"page":"99-105","source":"Crossref","is-referenced-by-count":0,"title":["AI-Driven Smishing Detection in Android Devices Using TinyBERT and Aquila Optimization"],"prefix":"10.23919","author":[{"given":"Akshat","family":"Gaurav","sequence":"first","affiliation":[{"name":"Ronin Institute,Montclair,NJ,USA"}]},{"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[{"name":"Asia University,Department of Computer Science and Information Engineering,Taiwan"}]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[{"name":"Hong Kong Metropolitan University,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2019-0041"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.30574\/wjaets.2023.9.1.0142"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.353301"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.325624"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.342128"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85990-9_39"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.365288"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.05.009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109944"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.361772"},{"issue":"1","key":"ref12","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s11235-016-0269-9","article-title":"S-detector: an enhanced security model for detecting smishing attack for mobile computing","volume":"66","author":"Joo","year":"2017","journal-title":"Telecommunication Systems"},{"issue":"3","key":"ref13","doi-asserted-by":"crossref","DOI":"10.32604\/cmc.2024.057138","article-title":"A hybrid cnn-brown-bear optimization framework for enhanced detection of url phishing attacks","volume":"81","author":"Gupta","year":"2024","journal-title":"Computers, Materials & Continua"},{"issue":"1","key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSWIS.359767","article-title":"Optimized ai-driven semantic web approach for enhancing phishing detection in e-commerce platforms","volume":"20","author":"Gaurav","year":"2024","journal-title":"International Journal on Semantic Web and Information Systems (IJSWIS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3463871"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.056476"},{"issue":"7","key":"ref17","doi-asserted-by":"crossref","first-page":"4975","DOI":"10.1007\/s00521-021-06305-y","article-title":"Dsmishsms-a system to detect smishing sms","volume":"35","author":"Mishra","year":"2023","journal-title":"Neural Computing and Applications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.050815"},{"issue":"7","key":"ref19","article-title":"Advancements in smishing detection: A novel approach utilizing graph neural networks","volume":"24","author":"Gowri","year":"2024","journal-title":"COMPUTER"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"100044","DOI":"10.1016\/j.csa.2024.100044","article-title":"Mutual information based logistic regression for phishing url detection","volume":"2","author":"Vajrobol","year":"2024","journal-title":"Cyber Security and Applications"},{"key":"ref21","article-title":"SMS Spam Collection","volume-title":"UCI Machine Learning Repository","author":"Almeida","year":"2011"}],"event":{"name":"2025 27th International Conference on Advanced Communications Technology (ICACT)","location":"Pyeong Chang, Korea, Republic of","start":{"date-parts":[[2025,2,16]]},"end":{"date-parts":[[2025,2,19]]}},"container-title":["2025 27th International Conference on Advanced Communications Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10936293\/10936294\/10936701.pdf?arnumber=10936701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T08:40:42Z","timestamp":1743237642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10936701\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,16]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/icact63878.2025.10936701","relation":{},"subject":[],"published":{"date-parts":[[2025,2,16]]}}}