{"id":"https://openalex.org/W3037441603","doi":"https://doi.org/10.1109/ccci49893.2020.9256804","title":"PhishGAN: Data Augmentation and Identification of Homoglyph Attacks","display_name":"PhishGAN: Data Augmentation and Identification of Homoglyph Attacks","publication_year":2020,"publication_date":"2020-11-03","ids":{"openalex":"https://openalex.org/W3037441603","doi":"https://doi.org/10.1109/ccci49893.2020.9256804","mag":"3037441603"},"language":"en","primary_location":{"id":"doi:10.1109/ccci49893.2020.9256804","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci49893.2020.9256804","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2006.13742","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059075218","display_name":"Lee Joon Sern","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lee Joon Sern","raw_affiliation_strings":["Ensign Labs, Ensign InfoSecurity, Singapore"],"affiliations":[{"raw_affiliation_string":"Ensign Labs, Ensign InfoSecurity, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030517958","display_name":"Yam Gui Peng David","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yam Gui Peng David","raw_affiliation_strings":["Ensign Labs, Ensign InfoSecurity, Singapore"],"affiliations":[{"raw_affiliation_string":"Ensign Labs, Ensign InfoSecurity, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112543714","display_name":"Chan Jin Hao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chan Jin Hao","raw_affiliation_strings":["Ensign Labs, Ensign InfoSecurity, Singapore"],"affiliations":[{"raw_affiliation_string":"Ensign Labs, Ensign InfoSecurity, Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059075218"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2947,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.56084744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8250945806503296},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8077107667922974},{"id":"https://openalex.org/keywords/levenshtein-distance","display_name":"Levenshtein distance","score":0.7857454419136047},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5857499241828918},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5680863857269287},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5596416592597961},{"id":"https://openalex.org/keywords/mistake","display_name":"Mistake","score":0.5560488104820251},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5515211224555969},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.5384634733200073},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5338614583015442},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46948036551475525},{"id":"https://openalex.org/keywords/font","display_name":"Font","score":0.430570513010025},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41904211044311523},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3618583679199219},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3534776568412781},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2666984796524048}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8250945806503296},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8077107667922974},{"id":"https://openalex.org/C2777515626","wikidata":"https://www.wikidata.org/wiki/Q496939","display_name":"Levenshtein distance","level":2,"score":0.7857454419136047},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5857499241828918},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5680863857269287},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5596416592597961},{"id":"https://openalex.org/C2777179996","wikidata":"https://www.wikidata.org/wiki/Q911222","display_name":"Mistake","level":2,"score":0.5560488104820251},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5515211224555969},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.5384634733200073},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5338614583015442},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46948036551475525},{"id":"https://openalex.org/C2777737414","wikidata":"https://www.wikidata.org/wiki/Q4868296","display_name":"Font","level":2,"score":0.430570513010025},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41904211044311523},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3618583679199219},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3534776568412781},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2666984796524048},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ccci49893.2020.9256804","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci49893.2020.9256804","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2006.13742","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2006.13742","pdf_url":"https://arxiv.org/pdf/2006.13742","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2006.13742","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2006.13742","pdf_url":"https://arxiv.org/pdf/2006.13742","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2096733369","https://openalex.org/W2131906261","https://openalex.org/W2194775991","https://openalex.org/W2552465644","https://openalex.org/W2598634450","https://openalex.org/W2605287558","https://openalex.org/W2689134854","https://openalex.org/W2804395939","https://openalex.org/W2949650786","https://openalex.org/W2962750014","https://openalex.org/W2962793481","https://openalex.org/W2963073614","https://openalex.org/W2963350250","https://openalex.org/W2963635116","https://openalex.org/W2974097630","https://openalex.org/W2980676478","https://openalex.org/W3099206234"],"related_works":["https://openalex.org/W2147687867","https://openalex.org/W2582695981","https://openalex.org/W2496907786","https://openalex.org/W2483185727","https://openalex.org/W2921504876","https://openalex.org/W2612325988","https://openalex.org/W2490611030","https://openalex.org/W3022607756","https://openalex.org/W2326471857","https://openalex.org/W2327192489"],"abstract_inverted_index":{"Homoglyph":[0,203],"attacks":[1],"are":[2,17,23,74],"a":[3,112,119,138,142,154,195,202],"common":[4],"technique":[5],"used":[6,163,209],"by":[7],"hackers":[8],"to":[9,20,27,36,53,104,115,164,177,182,210,218,226,239],"conduct":[10],"phishing.":[11,37],"Domain":[12],"names":[13],"or":[14],"links":[15],"that":[16,121,144],"visually":[18],"similar":[19],"actual":[21],"ones":[22],"created":[24],"via":[25],"punycode":[26,109],"obfuscate":[28],"the":[29,32,48,54,82,89,116,131,184,212,214,230,233],"attack,":[30],"making":[31],"victim":[33],"more":[34,92,187],"susceptible":[35],"For":[38],"example,":[39],"victims":[40],"may":[41],"mistake":[42],"\u201clinkedin.com\u201d":[43,45],"for":[44,79],"and":[46],"in":[47,140],"process,":[49],"divulge":[50],"personal":[51],"details":[52],"fake":[55],"website.":[56],"Current":[57],"State":[58],"of":[59,66,84,91,108,118,134,167,186,197,236],"The":[60],"Art":[61],"(SOTA)":[62],"typically":[63],"make":[64],"use":[65],"string":[67],"comparison":[68],"algorithms":[69],"(e.g.":[70],"Levenshtein":[71],"Distance),":[72],"which":[73],"computationally":[75],"heavy.":[76],"One":[77],"reason":[78],"this":[80],"is":[81,102,122],"lack":[83],"publicly":[85],"available":[86],"datasets,":[87],"hindering":[88],"training":[90],"advanced":[93],"Machine":[94],"Learning":[95],"(ML)":[96],"models.":[97],"Furthermore,":[98,220],"no":[99],"one":[100],"font":[101],"able":[103],"render":[105],"all":[106,147],"types":[107],"correctly,":[110],"posing":[111],"significant":[113],"challenge":[114,139],"creation":[117],"dataset":[120,143],"unbiased":[123],"toward":[124],"any":[125],"particular":[126],"font.":[127],"This":[128],"coupled":[129],"with":[130,201],"vast":[132],"number":[133],"internet":[135],"domains":[136],"pose":[137],"creating":[141],"can":[145,161,207],"capture":[146],"possible":[148],"variations.":[149],"Here,":[150],"we":[151,221],"show":[152],"how":[153,198,223],"conditional":[155],"Generative":[156],"Adversarial":[157],"Network":[158],"(GAN),":[159],"PhishGAN,":[160],"be":[162,208],"generate":[165,227],"images":[166],"hieroglyphs,":[168],"conditioned":[169],"on":[170,229],"non-homoglyph":[171],"input":[172],"text":[173],"images.":[174,191],"Practical":[175],"changes":[176],"current":[178],"SOTA":[179],"were":[180],"required":[181],"facilitate":[183],"generation":[185],"varied":[188],"homoglyph":[189,215],"text-based":[190],"We":[192],"also":[193],"demonstrate":[194,222],"workflow":[196],"PhishGAN":[199],"together":[200],"Identifier":[204],"(HI)":[205],"model":[206],"identify":[211],"domain":[213],"was":[216],"trying":[217],"imitate.":[219],"PhishGAN's":[224],"ability":[225],"datasets":[228],"fly,":[231],"facilitating":[232],"quick":[234],"adaptation":[235],"cybersecurity":[237],"systems":[238],"detect":[240],"new":[241],"threats":[242],"as":[243],"they":[244],"emerge.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2020-07-02T00:00:00"}
