{"id":"https://openalex.org/W4401210404","doi":"https://doi.org/10.1109/access.2024.3436812","title":"A Study on Adversarial Sample Resistance and Defense Mechanism for Multimodal Learning-Based Phishing Website Detection","display_name":"A Study on Adversarial Sample Resistance and Defense Mechanism for Multimodal Learning-Based Phishing Website Detection","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4401210404","doi":"https://doi.org/10.1109/access.2024.3436812"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3436812","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3436812","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3436812","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009023958","display_name":"Phan The Duy","orcid":"https://orcid.org/0000-0002-5945-3712"},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Phan The Duy","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","Vietnam National University, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]},{"raw_affiliation_string":"Vietnam National University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086229539","display_name":"V\u00f5 Quang Minh","orcid":"https://orcid.org/0000-0001-8574-7151"},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Vo Quang Minh","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","Vietnam National University, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]},{"raw_affiliation_string":"Vietnam National University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093127225","display_name":"Bui Tan Hai Dang","orcid":"https://orcid.org/0009-0004-3218-0672"},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Bui Tan Hai Dang","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","Vietnam National University, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]},{"raw_affiliation_string":"Vietnam National University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072689832","display_name":"Ngo Duc Hoang Son","orcid":"https://orcid.org/0009-0000-8101-7311"},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Ngo Duc Hoang Son","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","Vietnam National University, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]},{"raw_affiliation_string":"Vietnam National University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079464831","display_name":"Nguyen Huu Quyen","orcid":"https://orcid.org/0000-0002-0065-9919"},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Nguyen Huu Quyen","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","Vietnam National University, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]},{"raw_affiliation_string":"Vietnam National University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045030863","display_name":"Van-Hau Pham","orcid":"https://orcid.org/0000-0003-3147-3356"},"institutions":[{"id":"https://openalex.org/I123565023","display_name":"Vietnam National University Ho Chi Minh City","ror":"https://ror.org/00waaqh38","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Van-Hau Pham","raw_affiliation_strings":["Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","Vietnam National University, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Information Security Laboratory, University of Information Technology, Vietnam National University Ho Chi Minh City (UIT-VNU-HCM), Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]},{"raw_affiliation_string":"Vietnam National University, Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I123565023"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5009023958"],"corresponding_institution_ids":["https://openalex.org/I123565023"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":5.0713,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95904587,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"137805","last_page":"137824"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8551492691040039},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7810877561569214},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7704654932022095},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.601646363735199},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.530693769454956},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5305531024932861},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5226963758468628},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4752987325191498},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45233818888664246},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2339453399181366},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15986907482147217}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8551492691040039},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7810877561569214},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7704654932022095},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.601646363735199},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.530693769454956},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5305531024932861},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5226963758468628},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4752987325191498},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45233818888664246},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2339453399181366},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15986907482147217},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3436812","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3436812","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cabb6c9b0da7485587455a3907284330","is_oa":true,"landing_page_url":"https://doaj.org/article/cabb6c9b0da7485587455a3907284330","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 137805-137824 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3436812","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3436812","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":76,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W1985920648","https://openalex.org/W2082190528","https://openalex.org/W2117285489","https://openalex.org/W2293768274","https://openalex.org/W2304569074","https://openalex.org/W2418966180","https://openalex.org/W2517229335","https://openalex.org/W2567869469","https://openalex.org/W2603766943","https://openalex.org/W2619383789","https://openalex.org/W2620038827","https://openalex.org/W2806379428","https://openalex.org/W2909737018","https://openalex.org/W2913770005","https://openalex.org/W2945561205","https://openalex.org/W2954590176","https://openalex.org/W2963389226","https://openalex.org/W2963744840","https://openalex.org/W2964082701","https://openalex.org/W2972765591","https://openalex.org/W2982651529","https://openalex.org/W3004831388","https://openalex.org/W3089043621","https://openalex.org/W3090219579","https://openalex.org/W3094117827","https://openalex.org/W3101969156","https://openalex.org/W3103836116","https://openalex.org/W3113075730","https://openalex.org/W3114681532","https://openalex.org/W3118329104","https://openalex.org/W3133843004","https://openalex.org/W3158143049","https://openalex.org/W3158179156","https://openalex.org/W3161563331","https://openalex.org/W3164220323","https://openalex.org/W3195446130","https://openalex.org/W3207651366","https://openalex.org/W4206331418","https://openalex.org/W4210343783","https://openalex.org/W4213287278","https://openalex.org/W4220750989","https://openalex.org/W4224275454","https://openalex.org/W4280614404","https://openalex.org/W4293846201","https://openalex.org/W4301880089","https://openalex.org/W4307640249","https://openalex.org/W4312799784","https://openalex.org/W4313196990","https://openalex.org/W4313588323","https://openalex.org/W4313591247","https://openalex.org/W4315767683","https://openalex.org/W4319777762","https://openalex.org/W4319996419","https://openalex.org/W4321790700","https://openalex.org/W4322487983","https://openalex.org/W4322706916","https://openalex.org/W4324118121","https://openalex.org/W4367598850","https://openalex.org/W4383503463","https://openalex.org/W4386838570","https://openalex.org/W4389374627","https://openalex.org/W4390002552","https://openalex.org/W4390357547","https://openalex.org/W4392943341","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6726407388","https://openalex.org/W6729756640","https://openalex.org/W6739868092","https://openalex.org/W6782057393","https://openalex.org/W6785796486","https://openalex.org/W6794755308","https://openalex.org/W6800680588"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4283221438","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2930249865"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,47,114,145,208,239,252,289,296,307,310,332,348,355,367],"advancement":[4],"of":[5,49,102,116,147,210,284,303,323,334,350,369],"Artificial":[6],"Intelligence":[7],"(AI)":[8],"has":[9,45],"significantly":[10,337],"impacted":[11],"various":[12],"fields,":[13],"particularly":[14,129],"cybersecurity.":[15],"However,":[16,70],"current":[17],"approaches":[18],"to":[19,32,90,138,144,180,206,237,244,286,325],"combating":[20],"cyber":[21],"threats,":[22],"such":[23,225],"as":[24,86,226],"phishing":[25,108,133,370],"attacks,":[26],"remain":[27],"limited":[28],"by":[29,257,268],"their":[30,95,140],"inability":[31],"address":[33,91],"evolving":[34],"vulnerabilities":[35],"in":[36,63,113,366],"online":[37],"systems":[38],"effectively.":[39],"Despite":[40,94],"this":[41,92,121,123,158,269],"challenge,":[42,122],"extensive":[43],"research":[44,103],"demonstrated":[46,256],"efficacy":[48],"learning-based":[50,127],"models,":[51,128],"notably":[52],"Machine":[53,292],"Learning":[54,57,61],"(ML),":[55],"Ensemble":[56],"(EL),":[58],"and":[59,134,152,175,193,203,216,231,242,277,353,363,373],"Deep":[60],"(DL),":[62],"developing":[64],"defensive":[65],"mechanisms":[66],"against":[67,317],"these":[68,71],"threats.":[69],"methods":[72,352],"encounter":[73],"challenges":[74],"when":[75],"dealing":[76],"with":[77,200,280,299,319,339],"adversarial":[78,117,135,148,374],"examples":[79],"(AEs).":[80],"Multimodal":[81,311],"model":[82,294,312],"(MM)":[83],"have":[84],"emerged":[85],"a":[87,99,219,258,300,320],"promising":[88],"approach":[89,234],"issue.":[93],"potential,":[96],"there":[97],"is":[98,255,295,336],"notable":[100],"lack":[101],"employing":[104],"multimodal":[105,130],"techniques":[106],"for":[107,132,357],"website":[109,149,371],"detection":[110,301,321,341,372],"(PWD),":[111],"especially":[112],"context":[115,368],"websites.":[118],"To":[119],"tackle":[120],"paper":[124],"assesses":[125],"15":[126],"ones,":[131],"detection,":[136],"aiming":[137],"enhance":[139,207],"defense":[141,198,330,364],"capabilities.":[142],"Due":[143],"scarcity":[146],"examples,":[150],"training":[151,215],"testing":[153,217],"models":[154,213,279,335],"are":[155],"limited.":[156],"Therefore,":[157],"study":[159],"proposes":[160],"an":[161,281],"innovative":[162],"attack":[163,188,362],"framework":[164,184],"AWG":[165],"-":[166],"AdversarialWebsite":[167],"Generation":[168],"that":[169,251],"employs":[170],"Generative":[171],"Adversarial":[172],"Networks":[173],"(GAN)":[174],"transfer-based":[176],"black":[177],"box":[178],"attacks":[179],"create":[181],"AEs.":[182],"This":[183,233],"closely":[185],"mirrors":[186],"real-world":[187,246],"scenarios,":[189],"ensuring":[190],"high":[191,204],"effectiveness":[192,205,254],"realism.":[194],"Finally,":[195],"we":[196],"present":[197],"strategies":[199,365],"straightforward":[201],"implementation":[202],"resistance":[209,316,333],"models.":[211],"The":[212],"underwent":[214],"on":[218],"dataset":[220],"collected":[221],"from":[222],"reputable":[223],"sources":[224],"OpenPhish,":[227],"PhishTank,":[228],"Phishing":[229],"Database,":[230],"Alexa.":[232],"was":[235],"chosen":[236],"ensure":[238],"dataset\u2019s":[240],"diversity":[241],"relevance":[243],"reflect":[245],"conditions.":[247],"Experimental":[248],"results":[249],"highlight":[250],"Generator\u2019s":[253],"domain":[259],"structure":[260],"generation":[261],"rate":[262,283,302,322],"exceeding":[263],"90%.":[264,344],"Moreover,":[265],"AEs":[266],"generated":[267],"Generator":[270],"effectively":[271],"bypass":[272],"most":[273,297],"state-of-the-art":[274],"ML,":[275],"DL,":[276],"EL":[278],"evasion":[282],"up":[285,324],"88%.":[287],"Notably,":[288],"Support":[290],"Vector":[291],"(SVM)":[293],"vulnerable,":[298],"only":[304],"10.02%.":[305],"On":[306],"other":[308],"hand,":[309],"Shark-Eyes":[313],"demonstrates":[314],"outstanding":[315],"AEs,":[318],"99%.":[326],"Upon":[327],"applying":[328],"our":[329,351],"strategy,":[331],"boosted,":[338],"all":[340],"rates":[342],"surpassing":[343],"These":[345],"findings":[346],"underscore":[347],"robustness":[349],"pave":[354],"way":[356],"further":[358],"exploration":[359],"into":[360],"advanced":[361],"attacks.":[375]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
